CVE-2014-3120

The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL...

Basic Information

CVE State
PUBLISHED
Reserved Date
April 29, 2014
Published Date
July 28, 2014
Last Updated
February 10, 2025
Vendor
Elastic
Product
Elasticsearch
Description
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
Tags
elasticsearch cisa nuclei_scanner metasploit_scanner

CVSS Scores

CVSS v3.1

8.1 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS v2.0

6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

SSVC Information

Exploitation
active
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (2025-05-07 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-08-01 04:39:04 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-25 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

script_mvel_rce

Type: metasploit • Created: Unknown

Metasploit module for CVE-2014-3120

xpgdgit/CVE-2014-3120

Type: github • Created: 2022-08-01 04:39:04 UTC • Stars: 0

echohtp/ElasticSearch-CVE-2014-3120

Type: github • Created: 2014-07-07 20:28:34 UTC • Stars: 6

POC Code to exploite CVE-2014-3120

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Proof of Concept Exploit Available

  • Detected by Nuclei

  • Detected by Metasploit