First published: Mon Jun 15 2015(Updated: )
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Logstash | <=1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.