First published: Thu Feb 12 2015(Updated: )
The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elasticsearch Elasticsearch | <=1.3.7 | |
Elasticsearch Elasticsearch | =1.4.0 | |
Elasticsearch Elasticsearch | =1.4.0-beta1 | |
Elasticsearch Elasticsearch | =1.4.1 | |
Elasticsearch Elasticsearch | =1.4.2 | |
Elastic Elasticsearch | ||
redhat/Elasticsearch | <1.3.8 | 1.3.8 |
redhat/Elasticsearch | <1.4.3 | 1.4.3 |
Elastic Elasticsearch | <1.3.8 | |
Elastic Elasticsearch | >=1.4.0<1.4.3 | |
Redhat Fuse | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.