漏洞描述 CVE-2014-3120后,ElasticSearch默认的动态脚本语言换成了Groovy,并增加了沙盒,但默认仍然支持直接执行动态语言。本漏洞:1.是一个沙盒绕过;2.是一个Goovy代码执行漏洞。
相关漏洞推荐 POC CVE-2014-3120: ElasticSearch v1.1.1/1.2 RCE POC CVE-2015-1427: ElasticSearch - Remote Code Execution POC CVE-2015-3337: Elasticsearch - Local File Inclusion POC CVE-2015-5531: ElasticSearch <1.6.1 - Local File Inclusion POC CVE-2021-22145: Elasticsearch 7.10.0-7.13.3 - Information Disclosure POC CVE-2014-3120: ElasticSearch v1.1.1/1.2 RCE POC CVE-2015-1427: ElasticSearch - Remote Code Execution POC CVE-2015-3337: Elasticsearch File Read POC CVE-2015-5531: Elasticsearch CVE-2015-5531 POC CVE-2021-22145: ElasticSearch 7.13.3 - Memory disclosure POC elasticsearch-unauth: ElasticSearch Information Disclosure POC elasticsearch-default-login: ElasticSearch - Default Login POC elasticsearch: ElasticSearch Information Disclosure