2024-05-26 14:27:05 +02:00
### [CVE-2015-1427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1427)



### Description
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
### POC
#### Reference
- http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html
- http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html
- https://www.elastic.co/community/security/
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0ps/pocassistdb
- https://github.com/0x43f/Exploits
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Awrrays/FrameVul
- https://github.com/CLincat/vulcat
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CrackerCat/myhktools
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/GhostTroops/TOP
- https://github.com/GhostTroops/myhktools
- https://github.com/HimmelAward/Goby_POC
- https://github.com/IsmailSoltakhanov17/Monkey
- https://github.com/JERRY123S/all-poc
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Makare06/Monkey
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Xcod3bughunt3r/ExploitsTools
- https://github.com/XiphosResearch/exploits
- https://github.com/YrenWu/Elhackstic
- https://github.com/Z0fhack/Goby_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/RedTeamer
2024-05-26 14:27:05 +02:00
- https://github.com/amcai/myscan
- https://github.com/bigblackhat/oFx
- https://github.com/cqkenuo/HostScan
- https://github.com/cved-sources/cve-2015-1427
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/danieldizzy/Security-Research-Tutorials
- https://github.com/do0dl3/myhktools
- https://github.com/dr4v/exploits
- https://github.com/enomothem/PenTestNote
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/gitrobtest/Java-Security
- https://github.com/h3inzzz/cve2015_1427
- https://github.com/hktalent/TOP
- https://github.com/hktalent/myhktools
- https://github.com/huimzjty/vulwiki
- https://github.com/hzrhsyin/monkey
- https://github.com/iqrok/myhktools
- https://github.com/jbmihoub/all-poc
- https://github.com/jmedeng/suriya73-exploits
- https://github.com/jweny/pocassistdb
- https://github.com/kenuoseclab/HostScan
- https://github.com/lp008/Hack-readme
- https://github.com/maakinci/Monkey
- https://github.com/marcocesarato/Shell-BotKiller
- https://github.com/openx-org/BLEN
- https://github.com/password520/RedTeamer
- https://github.com/retr0-13/monkey-auto-pentool
- https://github.com/ricardolopezg/backend-swimm
- https://github.com/sepehrdaddev/blackbox
- https://github.com/shildenbrand/Exploits
- https://github.com/superfish9/pt
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/svuz/blackbox
- https://github.com/t0kx/exploit-CVE-2015-1427
- https://github.com/t0m4too/t0m4to
- https://github.com/touchmycrazyredhat/myhktools
- https://github.com/trhacknon/myhktools
- https://github.com/waqeen/cyber_security21
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/xpgdgit/CVE-2015-1427
- https://github.com/yulb2020/hello-world