← Retour aux CVEs
CVE-2015-4152
N/ADescription
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Details CVE
Score CVSS v3.1N/A
Publie6/15/2015
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
elastic:logstash
Faiblesses (CWE)
CWE-22
References
http://www.securityfocus.com/archive/1/535725/100/0/threaded(cve@mitre.org)
https://www.elastic.co/blog/logstash-1-4-3-released(cve@mitre.org)
https://www.elastic.co/community/security/(cve@mitre.org)
http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/535725/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/blog/logstash-1-4-3-released(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/community/security/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.