First published: Thu Jun 11 2015(Updated: )
All Elasticsearch versions from 1.0.0 to 1.5.2 are vulnerable to an attack that uses Elasticsearch to modify files read and executed by certain other applications. Upstream bug/commit unknown at the time of writing. Mitigation: =========== Users should upgrade to 1.6.0. Alternately, ensure that other applications are not present on the system, or that Elasticsearch cannot write into areas where these applications would read. External References: <a href="https://www.elastic.co/community/security/">https://www.elastic.co/community/security/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Elasticsearch | <1.6.0 | 1.6.0 |
Elastic Elasticsearch | =1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4165 is categorized as a high severity vulnerability affecting multiple versions of Elasticsearch.
To mitigate CVE-2015-4165, users should upgrade Elasticsearch to version 1.6.0.
CVE-2015-4165 affects all Elasticsearch versions from 1.0.0 to 1.5.2.
CVE-2015-4165 allows attackers to modify files that are read and executed by other applications using Elasticsearch.
Alternatively, users can ensure that other applications are properly secured to mitigate the risks associated with CVE-2015-4165.