← Voltar para CVEs
CVE-2015-4152
N/ADescricao
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado6/15/2015
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
elastic:logstash
Fraquezas (CWE)
CWE-22
Referencias
http://www.securityfocus.com/archive/1/535725/100/0/threaded(cve@mitre.org)
https://www.elastic.co/blog/logstash-1-4-3-released(cve@mitre.org)
https://www.elastic.co/community/security/(cve@mitre.org)
http://packetstormsecurity.com/files/132233/Logstash-1.4.2-Directory-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/535725/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/blog/logstash-1-4-3-released(af854a3a-2127-422b-91ae-364da2661108)
https://www.elastic.co/community/security/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.