CVE-2015-4152 in Logstash
Resumen (Inglés)
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Reservar
2015-06-01
Divulgación
2015-06-15
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 75893 | Elasticsearch Logstash File Output Plugin recorrido de directorios | 22 | No está definido | Arreglo oficial | CVE-2015-4152 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV