CVE-2015-4152

Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html - () http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html -
References () http://www.securityfocus.com/archive/1/535725/100/0/threaded - () http://www.securityfocus.com/archive/1/535725/100/0/threaded -
References () https://www.elastic.co/blog/logstash-1-4-3-released - Vendor Advisory () https://www.elastic.co/blog/logstash-1-4-3-released - Vendor Advisory
References () https://www.elastic.co/community/security/ - Vendor Advisory () https://www.elastic.co/community/security/ - Vendor Advisory

Information

Published : 2015-06-15 15:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4152

Mitre link : CVE-2015-4152

CVE.ORG link : CVE-2015-4152


JSON object : View

Products Affected

elastic

  • logstash
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')