CVE-2015-1427

CRITICAL KEV RANSOMWARE NUCLEI LAB

Elasticsearch <1.3.8, <1.4.3 - Command Injection

Title source: llm

Description

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

Exploits (9)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/36415
exploitdb WORKING POC VERIFIED
by Xiphos Research Ltd · pythonremotelinux
https://www.exploit-db.com/exploits/36337
nomisec WORKING POC 32 stars
by t0kx · remote
https://github.com/t0kx/exploit-CVE-2015-1427
nomisec STUB
by Sebikea · poc
https://github.com/Sebikea/CVE-2015-1427-for-trixie
nomisec WORKING POC
by xpgdgit · remote
https://github.com/xpgdgit/CVE-2015-1427
nomisec WORKING POC
by cved-sources · poc
https://github.com/cved-sources/cve-2015-1427
nomisec WORKING POC
by cyberharsh · poc
https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427
metasploit WORKING POC EXCELLENT
by Cameron Morris, Darren Martyn, juan vazquez · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/elasticsearch/search_groovy_script.rb

Nuclei Templates (1)

ElasticSearch - Remote Code Execution
HIGHby pikpikcu
FOFA: index_not_found_exception

Scores

CVSS v3 9.8
EPSS 0.9233
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-25
VulnCheck KEV 2019-04-09
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2022-5539
Ransomware Use Confirmed
Status published
Products (3)
elastic/elasticsearch < 1.3.8
org.elasticsearch/elasticsearch 0 - 1.3.8Maven
redhat/fuse 1.0.0
Published Feb 17, 2015
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026