Описание
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.0.3+dfsg-7 |
| esm-infra-legacy/trusty | DNE | |
| lucid | DNE | |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | released | 1.0.3+dfsg-5+deb8u1 |
| utopic | DNE | |
| vivid | released | 1.0.3+dfsg-5+deb8u1build0.15.04.1 |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1. ...
Improper Limitation of a Pathname to a Restricted Directory in Elasticsearch
4.3 Medium
CVSS2