Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1427

Опубликовано: 17 фев. 2015
Источник: debian
EPSS Критический

Описание

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
elasticsearchnot-affectedpackage

Примечания

  • http://seclists.org/bugtraq/2015/Feb/92

  • Problem in the Groovy scripting engine.

EPSS

Процентиль: 100%
0.92326
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 11 лет назад

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

CVSS3: 6.5
redhat
почти 11 лет назад

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

CVSS3: 9.8
nvd
почти 11 лет назад

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

github
больше 3 лет назад

Improper Access Control in Elasticsearch

EPSS

Процентиль: 100%
0.92326
Критический