Lucene search

K
freebsdFreeBSD43AC9D42-1B9A-11E5-B43D-002590263BF5
HistoryMay 22, 2014 - 12:00 a.m.

elasticsearch and logstash -- remote OS command execution via dynamic scripting

2014-05-2200:00:00
vuxml.freebsd.org
14

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.532 Medium

EPSS

Percentile

97.6%

Elastic reports:

Vulnerability Summary: In Elasticsearch versions 1.1.x and prior,
dynamic scripting is enabled by default. This could allow an
attacker to execute OS commands.
Remediation Summary: Disable dynamic scripting.

Logstash 1.4.2 was bundled with Elasticsearch 1.1.1, which is
vulnerable to CVE-2014-3120. These binaries are used in
Elasticsearch output specifically when using the node protocol.
Since a node client joins the Elasticsearch cluster, the attackers
could use scripts to execute commands on the host OS using the node
client’s URL endpoint. With 1.4.3 release, we are packaging Logstash
with Elasticsearch 1.5.2 binaries which by default disables the
ability to run scripts. This also affects users who are using the
configuration option embedded=>true in the Elasticsearch output
which starts a local embedded Elasticsearch cluster. This is
typically used in development environment and proof of concept
deployments. Regardless of this vulnerability, we strongly recommend
not using embedded in production.
Note that users of transport and http protocol are not vulnerable
to this attack.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchelasticsearch< 1.2.0UNKNOWN
FreeBSDanynoarchlogstash< 1.4.3UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.532 Medium

EPSS

Percentile

97.6%