First published: Mon Jun 15 2015(Updated: )
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Logstash Output Plugin for Elasticsearch | <=1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4152 is classified as a high severity vulnerability due to its ability to allow remote attackers to write to arbitrary files.
To fix CVE-2015-4152, upgrade Elasticsearch Logstash to version 1.4.3 or later.
CVE-2015-4152 is a directory traversal vulnerability affecting the file output plugin in Logstash.
CVE-2015-4152 affects any user running Logstash versions prior to 1.4.3 that utilizes the file output plugin.
An attacker exploiting CVE-2015-4152 can write to arbitrary files on the server, potentially leading to data breaches or system compromise.