Elasticsearch Transport Protocol Unspecified Remote Code Execution

critical Nessus Plugin ID 105752

Synopsis

Elasticsearch contains an unspecified flaw related to the transport protocol that may allow a remote attacker to execute arbitrary code.

Description

Elasticsearch could allow a remote attacker to execute arbitrary code on the system, caused by an error in the transport protocol. An attacker could exploit this vulnerability to execute arbitrary code on the system.

Solution

Users should upgrade to 1.6.1 or 1.7.0. Alternately, ensure that only trusted applications have access to the transport protocol port

See Also

http://www.nessus.org/u?c6b6cf1a

Plugin Details

Severity: Critical

ID: 105752

File Name: elasticsearch_rce_2015.nasl

Version: 1.5

Type: remote

Family: Databases

Published: 1/11/2018

Updated: 11/8/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-5377

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:elasticsearch:elasticsearch

Required KB Items: installed_sw/Elasticsearch

Exploit Ease: No known exploits are available

Patch Publication Date: 7/16/2015

Vulnerability Publication Date: 7/16/2015

Reference Information

CVE: CVE-2015-5377