Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.elasticsearch.org/blog/logstash-1-4-2/ | |
http://www.securityfocus.com/archive/1/532841/100/0/threaded | mailing list |
https://www.elastic.co/community/security/ | vendor advisory |