CVE-2014-3120
HIGH KEV NUCLEIElasticsearch < 1.2 - Improper Access Control
Title source: ruleDescription
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/33588
exploitdb
WORKING POC
VERIFIED
by Jeff Geiger · htmlwebappsmultiple
https://www.exploit-db.com/exploits/33370
nomisec
WORKING POC
6 stars
by echohtp · remote
https://github.com/echohtp/ElasticSearch-CVE-2014-3120
metasploit
WORKING POC
EXCELLENT
by Alex Brasetvik, Bouke van der Bijl, juan vazquez · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/elasticsearch/script_mvel_rce.rb
Nuclei Templates (1)
ElasticSearch v1.1.1/1.2 RCE
MEDIUMby pikpikcu
FOFA:
index_not_found_exception
References (9)
Scores
CVSS v3
8.1
EPSS
0.8260
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Details
CISA KEV
2022-03-25
VulnCheck KEV
2022-03-25
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2022-5879
CWE
CWE-284
Status
published
Products (3)
elastic/elasticsearch
< 1.2.0
elasticsearch/elasticsearch
< 1.2
org.elasticsearch/elasticsearch
0 - 1.4.0.Beta1Maven
Published
Jul 28, 2014
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026