Lucene search

K
freebsdFreeBSD24BDE04F-1A10-11E5-B43D-002590263BF5
HistoryJun 09, 2015 - 12:00 a.m.

logstash -- Directory traversal vulnerability in the file output plugin

2015-06-0900:00:00
vuxml.freebsd.org
13

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.003 Low

EPSS

Percentile

70.8%

Elastic reports:

An attacker could use the File output plugin with dynamic field
references in the path option to traverse paths outside of Logstash
directory. This technique could also be used to overwrite any files
which can be accessed with permissions associated with Logstash
user. This release sandboxes the paths which can be traversed using
the configuration. We have also disallowed use of dynamic field
references if the path options is pointing to an absolute path.
We have added this vulnerability to our CVE page and are working
on filling out the CVE. We would like to thank Colin Coghill for
reporting the issue and working with us on the resolution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlogstash< 1.4.3UNKNOWN

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.003 Low

EPSS

Percentile

70.8%

Related for 24BDE04F-1A10-11E5-B43D-002590263BF5