Lucene search

K
githubGitHub Advisory DatabaseGHSA-W94P-6MHW-4QXW
HistoryMay 14, 2022 - 2:49 a.m.

Improper Access Control in Elasticsearch

2022-05-1402:49:44
CWE-284
GitHub Advisory Database
github.com
21

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.874 High

EPSS

Percentile

98.7%

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

Affected configurations

Vulners
Node
github_advisory_databaseorg.elasticsearch\Matchelasticsearch
OR
github_advisory_databaseorg.elasticsearch\Matchelasticsearch

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.874 High

EPSS

Percentile

98.7%