### [CVE-2015-1427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1427) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. ### POC #### Reference - http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html - http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html - https://www.elastic.co/community/security/ #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0neXo0r/Exploits - https://github.com/0ps/pocassistdb - https://github.com/0x43f/Exploits - https://github.com/20142995/Goby - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Awrrays/FrameVul - https://github.com/CLincat/vulcat - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CrackerCat/myhktools - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/GhostTroops/TOP - https://github.com/GhostTroops/myhktools - https://github.com/HimmelAward/Goby_POC - https://github.com/IsmailSoltakhanov17/Monkey - https://github.com/JE2Se/AssetScan - https://github.com/JERRY123S/all-poc - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Makare06/Monkey - https://github.com/NCSU-DANCE-Research-Group/CDL - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-POC - https://github.com/TrojanAZhen/Self_Back - https://github.com/Xcod3bughunt3r/ExploitsTools - https://github.com/XiphosResearch/exploits - https://github.com/YrenWu/Elhackstic - https://github.com/Z0fhack/Goby_POC - https://github.com/ZTK-009/RedTeamer - https://github.com/amcai/myscan - https://github.com/bigblackhat/oFx - https://github.com/cqkenuo/HostScan - https://github.com/cved-sources/cve-2015-1427 - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/danieldizzy/Security-Research-Tutorials - https://github.com/do0dl3/myhktools - https://github.com/dr4v/exploits - https://github.com/enomothem/PenTestNote - https://github.com/fengjixuchui/RedTeamer - https://github.com/gitrobtest/Java-Security - https://github.com/h3inzzz/cve2015_1427 - https://github.com/hktalent/TOP - https://github.com/hktalent/myhktools - https://github.com/huimzjty/vulwiki - https://github.com/hzrhsyin/monkey - https://github.com/iqrok/myhktools - https://github.com/jbmihoub/all-poc - https://github.com/jmedeng/suriya73-exploits - https://github.com/jweny/pocassistdb - https://github.com/kenuoseclab/HostScan - https://github.com/lp008/Hack-readme - https://github.com/maakinci/Monkey - https://github.com/marcocesarato/Shell-BotKiller - https://github.com/openx-org/BLEN - https://github.com/password520/RedTeamer - https://github.com/retr0-13/monkey-auto-pentool - https://github.com/ricardolopezg/backend-swimm - https://github.com/sepehrdaddev/blackbox - https://github.com/shildenbrand/Exploits - https://github.com/superfish9/pt - https://github.com/superlink996/chunqiuyunjingbachang - https://github.com/svuz/blackbox - https://github.com/t0kx/exploit-CVE-2015-1427 - https://github.com/t0m4too/t0m4to - https://github.com/touchmycrazyredhat/myhktools - https://github.com/trhacknon/myhktools - https://github.com/waqeen/cyber_security21 - https://github.com/weeka10/-hktalent-TOP - https://github.com/xpgdgit/CVE-2015-1427 - https://github.com/yulb2020/hello-world