First published: Mon Aug 17 2015(Updated: )
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Elasticsearch | <=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5531 is considered to be of high severity due to its potential for unauthorized file access.
To fix CVE-2015-5531, upgrade Elasticsearch to version 1.6.1 or later.
CVE-2015-5531 affects all versions of Elasticsearch prior to 1.6.1.
An attacker could exploit CVE-2015-5531 to read arbitrary files on the server using snapshot API calls.
There are no known workarounds for CVE-2015-5531, so updating is the only effective solution.