FreeBSD : elasticsearch -- XSS vulnerability in the CORS functionality (5951fb49-1ba2-11e5-b43d-002590263bf5)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Elastic reports :

Vulnerability Summary: Elasticsearch versions 1.3.x and prior have a
default configuration for CORS that allows an attacker to craft links
that could cause a user's browser to send requests to Elasticsearch
instances on their local network. These requests could cause data loss
or compromise.

Remediation Summary: Users should either set 'http.cors.enabled' to
false, or set 'http.cors.allow-origin' to the value of the server that
should be allowed access, such as localhost or a server hosting
Kibana. Disabling CORS entirely with the former setting is more
secure, but may not be suitable for all use cases.

See also :

https://www.elastic.co/community/security
https://www.elastic.co/blog/elasticsearch-1-4-0-beta-released
http://www.nessus.org/u?13037b05
http://www.securityfocus.com/archive/1/archive/1/533602/100/0/threaded
http://www.nessus.org/u?eeaa4c85

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84412 ()

Bugtraq ID: 70233

CVE ID: CVE-2014-6439

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now