Elasticsearch <1.3.8, <1.4.3 - Command Injection
Title source: llmDescription
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
Exploits (9)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/36415
exploitdb
WORKING POC
VERIFIED
by Xiphos Research Ltd · pythonremotelinux
https://www.exploit-db.com/exploits/36337
nomisec
WORKING POC
by cyberharsh · poc
https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427
metasploit
WORKING POC
EXCELLENT
by Cameron Morris, Darren Martyn, juan vazquez · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/elasticsearch/search_groovy_script.rb
Nuclei Templates (1)
ElasticSearch - Remote Code Execution
HIGHby pikpikcu
FOFA:
index_not_found_exception
References (9)
Scores
CVSS v3
9.8
EPSS
0.9233
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CISA KEV
2022-03-25
VulnCheck KEV
2019-04-09
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2022-5539
Ransomware Use
Confirmed
Status
published
Products (3)
elastic/elasticsearch
< 1.3.8
org.elasticsearch/elasticsearch
0 - 1.3.8Maven
redhat/fuse
1.0.0
Published
Feb 17, 2015
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026