2024-12-08 03:06:42 +00:00

121 lines
3.4 KiB
JSON

{
"id": "CVE-2015-4152",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-06-15T15:59:11.540",
"lastModified": "2024-11-21T02:30:31.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en el plugin file output en Elasticsearch Logstash anterior a 1.4.3 permite a atacantes remotos escribir en ficheros arbitrarios a trav\u00e9s de vectores relacionados con referencia a campos din\u00e1micos en la opci\u00f3n de rutas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.2",
"matchCriteriaId": "2042FB04-763F-4C30-AF0A-2AD364852E8D"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/535725/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "https://www.elastic.co/blog/logstash-1-4-3-released",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.elastic.co/community/security/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/535725/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.elastic.co/blog/logstash-1-4-3-released",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.elastic.co/community/security/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}