Elasticsearch Transport Protocol Unspecified Remote Code Execution

Critical Nessus Plugin ID 105752


Elasticsearch contains an unspecified flaw related to the transport protocol that may allow a remote attacker to execute arbitrary code.


Elasticsearch could allow a remote attacker to execute arbitrary code on the system, caused by an error in the transport protocol. An attacker could exploit this vulnerability to execute arbitrary code on the system.


Users should upgrade to 1.6.1 or 1.7.0. Alternately, ensure that only trusted applications have access to the transport protocol port

See Also


Plugin Details

Severity: Critical

ID: 105752

File Name: elasticsearch_rce_2015.nasl

Version: 1.3

Type: remote

Family: Databases

Published: 2018/01/11

Modified: 2018/03/15

Dependencies: 81817

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:elasticsearch:elasticsearch

Required KB Items: installed_sw/Elasticsearch

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/07/16

Vulnerability Publication Date: 2015/07/16

Reference Information

CVE: CVE-2015-5377

OSVDB: 124883