CVE-2014-3120

HIGH KEV NUCLEI

Elasticsearch < 1.2 - Improper Access Control

Title source: rule

Description

The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/33588
exploitdb WORKING POC VERIFIED
by Jeff Geiger · htmlwebappsmultiple
https://www.exploit-db.com/exploits/33370
nomisec WORKING POC 6 stars
by echohtp · remote
https://github.com/echohtp/ElasticSearch-CVE-2014-3120
nomisec WORKING POC
by xpgdgit · remote
https://github.com/xpgdgit/CVE-2014-3120
nomisec WRITEUP
by jeffgeiger · poc
https://github.com/jeffgeiger/es_inject
metasploit WORKING POC EXCELLENT
by Alex Brasetvik, Bouke van der Bijl, juan vazquez · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/elasticsearch/script_mvel_rce.rb

Nuclei Templates (1)

ElasticSearch v1.1.1/1.2 RCE
MEDIUMby pikpikcu
FOFA: index_not_found_exception

Scores

CVSS v3 8.1
EPSS 0.8260
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Details

CISA KEV 2022-03-25
VulnCheck KEV 2022-03-25
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2022-5879
CWE
CWE-284
Status published
Products (3)
elastic/elasticsearch < 1.2.0
elasticsearch/elasticsearch < 1.2
org.elasticsearch/elasticsearch 0 - 1.4.0.Beta1Maven
Published Jul 28, 2014
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026