Vulnerability Name: | CVE-2015-4165 (CCN-103784) | ||||||||||||||||
Assigned: | 2015-06-09 | ||||||||||||||||
Published: | 2015-06-09 | ||||||||||||||||
Updated: | 2018-10-09 | ||||||||||||||||
Summary: | The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||
CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P) 4.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-4165 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html Source: CCN Type: BugTraq Mailing List, Tue, 9 Jun 2015 14:39:33 -0700 Elasticsearch vulnerability CVE-2015-4165 Source: BUGTRAQ Type: UNKNOWN 20150609 Elasticsearch vulnerability CVE-2015-4165 Source: BUGTRAQ Type: UNKNOWN 20151106 Elasticsearch vulnerability CVE-2015-4165 Source: BID Type: Mitigation, Third Party Advisory, VDB Entry 75113 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1230761 Source: XF Type: UNKNOWN elasticsearch-cve20154165-code-exec(103784) Source: CONFIRM Type: Vendor Advisory https://www.elastic.co/community/security/ Source: CCN Type: Elasticsearch Web site Download Elasticsearch | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |