First published: Fri May 01 2015(Updated: )
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Elasticsearch | <=1.4.4 | |
Elastic Elasticsearch | =1.5.0 | |
Elastic Elasticsearch | =1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3337 is classified as a medium severity vulnerability that allows remote attackers to exploit directory traversal.
CVE-2015-3337 affects Elasticsearch versions before 1.4.5 and version 1.5.0 to 1.5.1.
To fix CVE-2015-3337, upgrade Elasticsearch to version 1.4.5 or 1.5.2 and later.
CVE-2015-3337 enables remote attackers to read arbitrary files on the server via directory traversal.
Yes, CVE-2015-3337 specifically affects Elasticsearch when a site plugin is enabled.