9.8
CVSSv3

CVE-2015-5377

Published: 06/03/2018 Updated: 11/04/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Elasticsearch prior to 1.6.1 allows remote malicious users to execute arbitrary code via unspecified vectors involving the transport protocol. NOTE: ZDI appears to claim that CVE-2015-3253 and CVE-2015-5377 are the same vulnerability

Vulnerable Product Search on Vulmon Subscribe to Product

elastic elasticsearch

Vendor Advisories

** DISPUTED ** Elasticsearch before 161 allows remote attackers to execute arbitrary code via unspecified vectors involving the transport protocol NOTE: ZDI appears to claim that CVE-2015-3253 and CVE-2015-5377 are the same vulnerability ...

Github Repositories

We'll post findings from an infected confluence-systems we investigated recently, to show how it looks/feel like. the most systems we took a look at were infected with mining-bots like kerberods.

Shell BotKiller We'll post findings from an infected confluence-systems we investigated recently, to show how it looks/feel like The most systems we took a look at were infected with mining-bots like kerberods With the rise of inexpensive Virtual Servers and popular services that install insecurely by default, coupled with some juicy vulnerabilities (read: RCE - Remote C

Java deserialization exploit for elasticsearch 1.5.2 CVE-2015-5377

CVE-2015-5377 Elasticsearch 152 is vulnerable to RCE through insecure java deserialization The exploit attack the transport protocol on port 9300 The deserialization is based on Groovy MethodClosure chain to achive RCE

Java deserialization exploit for elasticsearch 1.5.2 CVE-2015-5377

CVE-2015-5377 Elasticsearch 152 is vulnerable to RCE through insecure java deserialization The exploit attack the transport protocol on port 9300 The deserialization is based on Groovy MethodClosure chain to achive RCE

A repository of code for generating or producing metrics

This repository is for a variety of code dedicated to metrics for "cyber risk" or infosec and hacking as I know it The goal is to provide some useful tools and extensions to cyber risk metricians and quants The Leverett-Wightman-cost was a simple idea invented with Reid Wightman while scanning the internet looking for vulnerable Programmable Logics Controllers The