The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/132234/Elasticsearch-1.5.2-File-Creation.html | vdb entry third party advisory |
http://www.securityfocus.com/archive/1/535727/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/75113 | vdb entry third party advisory mitigation |
https://bugzilla.redhat.com/show_bug.cgi?id=1230761 | issue tracking third party advisory |
http://www.securityfocus.com/archive/1/536855/100/0/threaded | mailing list |
https://www.elastic.co/community/security/ | vendor advisory |