CVE-2014-3120

The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL...

Basic Information

CVE State
PUBLISHED
Reserved Date
April 29, 2014
Published Date
July 28, 2014
Last Updated
February 10, 2025
Vendor
n/a
Product
n/a
Description
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.

CVSS Scores

CVSS v3.1

8.1 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

SSVC Information

Exploitation
active
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (added 2022-03-25 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-08-01 04:39:04 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-25 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

script_mvel_rce

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-3120

xpgdgit/CVE-2014-3120

Type: github • Created: 2022-08-01 04:39:04 UTC • Stars: 0

echohtp/ElasticSearch-CVE-2014-3120

Type: github • Created: 2014-07-07 20:28:34 UTC • Stars: 6

POC Code to exploite CVE-2014-3120