← Volver a CVEs
CVE-2015-4152
N/ADescripcion
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado6/15/2015
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
elastic:logstash
Debilidades (CWE)
CWE-22
Referencias
http://www.securityfocus.com/archive/1/535725/100/0/threaded(cve@mitre.org)
https://www.elastic.co/blog/logstash-1-4-3-released(cve@mitre.org)
https://www.elastic.co/community/security/(cve@mitre.org)
http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/535725/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/blog/logstash-1-4-3-released(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/community/security/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.