CVE-2014-4326CVE-2014-4326

Affected configuration(s):

cpe:/a:elasticsearch:logstash:1.0.14
cpe:/a:elasticsearch:logstash:1.0.15
cpe:/a:elasticsearch:logstash:1.0.16
cpe:/a:elasticsearch:logstash:1.0.17
cpe:/a:elasticsearch:logstash:1.1.0
cpe:/a:elasticsearch:logstash:1.1.0.1
cpe:/a:elasticsearch:logstash:1.1.1
cpe:/a:elasticsearch:logstash:1.1.2
cpe:/a:elasticsearch:logstash:1.1.3
cpe:/a:elasticsearch:logstash:1.1.4
cpe:/a:elasticsearch:logstash:1.1.5
cpe:/a:elasticsearch:logstash:1.1.6
cpe:/a:elasticsearch:logstash:1.1.7
cpe:/a:elasticsearch:logstash:1.1.8
cpe:/a:elasticsearch:logstash:1.1.9
cpe:/a:elasticsearch:logstash:1.1.10
cpe:/a:elasticsearch:logstash:1.1.11
cpe:/a:elasticsearch:logstash:1.1.12
cpe:/a:elasticsearch:logstash:1.1.13
cpe:/a:elasticsearch:logstash:1.2.1
cpe:/a:elasticsearch:logstash:1.2.2
cpe:/a:elasticsearch:logstash:1.3.0
cpe:/a:elasticsearch:logstash:1.3.1
cpe:/a:elasticsearch:logstash:1.3.2
cpe:/a:elasticsearch:logstash:1.3.3
cpe:/a:elasticsearch:logstash:1.4.0
cpe:/a:elasticsearch:logstash:1.4.1

Date published: 2014-07-22T10:55:09.550-04:00

Date last modified: 2015-06-25T10:52:17.080-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.elasticsearch.org/blog/logstash-1-4-2/

Summary: Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.