Elasticsearch Groovy Script RCE

high Nessus Plugin ID 81816

Synopsis

The remote web server hosts a Java application that is affected by a remote code execution vulnerability.

Description

The Elasticsearch application hosted on the remote web server is affected by a remote code execution vulnerability due to unspecified flaws in the Groovy script engine. A remote unauthenticated attacker, using a specially crafted request, can escape the sandbox and execute arbitrary Java code. A successful attack could allow the user to gain a remote shell or manipulate files on the remote system.

Solution

Upgrade to version 1.3.8 / 1.4.3 or later, or disable scripting.

See Also

https://seclists.org/bugtraq/2015/Feb/92

https://github.com/elastic/elasticsearch/issues/9655

Plugin Details

Severity: High

ID: 81816

File Name: elasticsearch_rce_CVE-2015-1427.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 3/13/2015

Updated: 3/28/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-1427

Vulnerability Information

CPE: cpe:/a:elasticsearch:elasticsearch

Required KB Items: installed_sw/Elasticsearch

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/11/2015

Vulnerability Publication Date: 12/9/2015

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (ElasticSearch Search Groovy Sandbox Bypass)

Reference Information

CVE: CVE-2015-1427

BID: 72585