RULE(RULE ID:310912)

Rule General Information
Release Date: 2017-01-25
Rule Name: Elasticsearch Arbitrary Java Code Execution Vulnerability (CVE-2014-3120)
Severity:
CVE ID:
Rule Protection Details
Description: The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Solaris, FreeBSD, Windows, Linux, Other Unix, Mac OS
Reference: ExploitDB:33370
SecurityFocusBID:67731
Solutions
The vendor has updated advisory on its official website. Please check it for more information.