8.1
CVE-2014-3120
- EPSS 84.55%
- Published 28.07.2014 19:55:04
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
Data is provided by the National Vulnerability Database (NVD)
Elasticsearch ≫ Elasticsearch Version < 1.2
25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Elasticsearch Remote Code Execution Vulnerability
VulnerabilityElasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 84.55% | 0.993 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.