FreeBSD : elasticsearch -- directory traversal attack via snapshot API (ae8c09cb-32da-11e5-a4a5-002590263bf5)

medium Nessus Plugin ID 85245

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Elastic reports :

Vulnerability Summary: Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory traversal attack.

Remediation Summary: Users should upgrade to 1.6.1 or later, or constrain access to the snapshot API to trusted sources.

Solution

Update the affected package.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201834

https://www.elastic.co/community/security

http://www.nessus.org/u?3200d59b

Plugin Details

Severity: Medium

ID: 85245

File Name: freebsd_pkg_ae8c09cb32da11e5a4a5002590263bf5.nasl

Version: 2.8

Type: local

Published: 8/6/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:elasticsearch, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/5/2015

Vulnerability Publication Date: 7/16/2015

Exploitable With

Elliot (Elasticsearch < 1.6.1 LFI)

Reference Information

CVE: CVE-2015-5531