漏洞描述 该漏洞源于 Kibana 中的原型污染问题,攻击者可以通过精心构造的文件上传和特定的 HTTP 请求绕过验证机制,攻击者利用该漏洞后,可以在受影响的系统上执行任意代码,可能导致数据泄露、系统被完全控制等严重后果
相关漏洞推荐 Elastic Cloud Enterprise 访问控制不当漏洞 可导致权限提升 POC CVE-2014-3120: ElasticSearch v1.1.1/1.2 RCE POC CVE-2015-1427: ElasticSearch - Remote Code Execution POC CVE-2015-3337: Elasticsearch - Local File Inclusion POC CVE-2015-5531: ElasticSearch <1.6.1 - Local File Inclusion POC CVE-2018-17246: Kibana - Local File Inclusion POC CVE-2019-7609: Kibana Timelion - Arbitrary Code Execution POC CVE-2021-22145: Elasticsearch 7.10.0-7.13.3 - Information Disclosure POC CVE-2022-22733: Apache ShardingSphere ElasticJob-UI privilege escalation POC CVE-2014-3120: ElasticSearch v1.1.1/1.2 RCE POC CVE-2015-1427: ElasticSearch - Remote Code Execution POC CVE-2015-3337: Elasticsearch File Read POC CVE-2015-5531: Elasticsearch CVE-2015-5531