Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-1427

Description

The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.

POC

Reference

- http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html

- http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html

- http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/

- https://www.elastic.co/community/security/

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0neXo0r/Exploits

- https://github.com/0ps/pocassistdb

- https://github.com/0x43f/Exploits

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/4ra1n/poc-runner

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Awrrays/FrameVul

- https://github.com/Bhanunamikaze/VaktScan

- https://github.com/CLincat/vulcat

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CrackerCat/myhktools

- https://github.com/Elsfa7-110/kenzer-templates

- https://github.com/GhostTroops/TOP

- https://github.com/GhostTroops/myhktools

- https://github.com/HardikQuantumCybernetic/newlearnerdancer.github.io

- https://github.com/HimmelAward/Goby_POC

- https://github.com/IsmailSoltakhanov17/Monkey

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/JE2Se/AssetScan

- https://github.com/JERRY123S/all-poc

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/Makare06/Monkey

- https://github.com/NCSU-DANCE-Research-Group/CDL

- https://github.com/NewLearnerdancer/newlearnerdancer.github.io

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Penterep/ptelastic

- https://github.com/Prakharvr/Phantom

- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s

- https://github.com/Sebikea/CVE-2015-1427-for-trixie

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Threekiii/Awesome-POC

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Xcod3bughunt3r/ExploitsTools

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/XiphosResearch/exploits

- https://github.com/Yamewrong/cve-lab

- https://github.com/YrenWu/Elhackstic

- https://github.com/Z0fhack/Goby_POC

- https://github.com/ZTK-009/RedTeamer

- https://github.com/amcai/myscan

- https://github.com/bigblackhat/oFx

- https://github.com/cc8700619/poc

- https://github.com/cqkenuo/HostScan

- https://github.com/cved-sources/cve-2015-1427

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/danieldizzy/Security-Research-Tutorials

- https://github.com/do0dl3/myhktools

- https://github.com/dr4v/exploits

- https://github.com/enomothem/PenTestNote

- https://github.com/fengjixuchui/RedTeamer

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/gitrobtest/Java-Security

- https://github.com/h3inzzz/cve2015_1427

- https://github.com/hhhaaarrruuu/PortVulnerability-Tool

- https://github.com/hktalent/TOP

- https://github.com/hktalent/myhktools

- https://github.com/huimzjty/vulwiki

- https://github.com/hzrhsyin/monkey

- https://github.com/iqrok/myhktools

- https://github.com/jbmihoub/all-poc

- https://github.com/jmedeng/suriya73-exploits

- https://github.com/jweny/pocassistdb

- https://github.com/kenuoseclab/HostScan

- https://github.com/lp008/Hack-readme

- https://github.com/maakinci/Monkey

- https://github.com/marcocesarato/Shell-BotKiller

- https://github.com/openx-org/BLEN

- https://github.com/password520/RedTeamer

- https://github.com/retr0-13/monkey-auto-pentool

- https://github.com/ricardolopezg/backend-swimm

- https://github.com/sepehrdaddev/blackbox

- https://github.com/shildenbrand/Exploits

- https://github.com/superfish9/pt

- https://github.com/superlink996/chunqiuyunjingbachang

- https://github.com/svuz/blackbox

- https://github.com/t0kx/exploit-CVE-2015-1427

- https://github.com/t0m4too/t0m4to

- https://github.com/touchmycrazyredhat/myhktools

- https://github.com/trhacknon/myhktools

- https://github.com/tzwlhack/AssetScan

- https://github.com/waqeen/cyber_security21

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/xasyhack/oscp2025

- https://github.com/xasyhack/oscp_cheat_sheet_2025

- https://github.com/xpgdgit/CVE-2015-1427

- https://github.com/yulb2020/hello-world