Lucene search

K
freebsdFreeBSD2184CCAD-1A10-11E5-B43D-002590263BF5
HistoryJun 24, 2014 - 12:00 a.m.

logstash -- Remote command execution in Logstash zabbix and nagios_nsca outputs

2014-06-2400:00:00
vuxml.freebsd.org
14

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

74.9%

Elastic reports:

The vulnerability impacts deployments that use the either the
zabbix or the nagios_nsca outputs. In these cases, an attacker
with an ability to send crafted events to any source of data for
Logstash could execute operating system commands with the
permissions of the Logstash process.
Deployments that do not use the zabbix or the nagios_nsca outputs
are not vulnerable and do not need to upgrade for this reason.
We have added this vulnerability to our CVE page and are working
on filling out the CVE.
We would like to thank Jan Karwowski and Danila Borisiuk for
reporting the issue and working with us on the resolution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlogstash< 1.4.2UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

74.9%

Related for 2184CCAD-1A10-11E5-B43D-002590263BF5