mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-24 15:54:10 +02:00
96 lines
4.0 KiB
Markdown
96 lines
4.0 KiB
Markdown
### [CVE-2015-1427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1427)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html
|
|
- http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html
|
|
- https://www.elastic.co/community/security/
|
|
|
|
#### Github
|
|
- https://github.com/0day404/vulnerability-poc
|
|
- https://github.com/0neXo0r/Exploits
|
|
- https://github.com/0ps/pocassistdb
|
|
- https://github.com/0x43f/Exploits
|
|
- https://github.com/20142995/Goby
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Awrrays/FrameVul
|
|
- https://github.com/CLincat/vulcat
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/CrackerCat/myhktools
|
|
- https://github.com/Elsfa7-110/kenzer-templates
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/GhostTroops/myhktools
|
|
- https://github.com/HimmelAward/Goby_POC
|
|
- https://github.com/IsmailSoltakhanov17/Monkey
|
|
- https://github.com/JE2Se/AssetScan
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/KayCHENvip/vulnerability-poc
|
|
- https://github.com/Makare06/Monkey
|
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/R0B1NL1N/E-x-p-l-o-i-t-s
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/TrojanAZhen/Self_Back
|
|
- https://github.com/Xcod3bughunt3r/ExploitsTools
|
|
- https://github.com/XiphosResearch/exploits
|
|
- https://github.com/YrenWu/Elhackstic
|
|
- https://github.com/Z0fhack/Goby_POC
|
|
- https://github.com/ZTK-009/RedTeamer
|
|
- https://github.com/amcai/myscan
|
|
- https://github.com/bigblackhat/oFx
|
|
- https://github.com/cqkenuo/HostScan
|
|
- https://github.com/cved-sources/cve-2015-1427
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/danieldizzy/Security-Research-Tutorials
|
|
- https://github.com/do0dl3/myhktools
|
|
- https://github.com/dr4v/exploits
|
|
- https://github.com/enomothem/PenTestNote
|
|
- https://github.com/fengjixuchui/RedTeamer
|
|
- https://github.com/gitrobtest/Java-Security
|
|
- https://github.com/h3inzzz/cve2015_1427
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/myhktools
|
|
- https://github.com/huimzjty/vulwiki
|
|
- https://github.com/hzrhsyin/monkey
|
|
- https://github.com/iqrok/myhktools
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/jmedeng/suriya73-exploits
|
|
- https://github.com/jweny/pocassistdb
|
|
- https://github.com/kenuoseclab/HostScan
|
|
- https://github.com/lp008/Hack-readme
|
|
- https://github.com/maakinci/Monkey
|
|
- https://github.com/marcocesarato/Shell-BotKiller
|
|
- https://github.com/openx-org/BLEN
|
|
- https://github.com/password520/RedTeamer
|
|
- https://github.com/retr0-13/monkey-auto-pentool
|
|
- https://github.com/ricardolopezg/backend-swimm
|
|
- https://github.com/sepehrdaddev/blackbox
|
|
- https://github.com/shildenbrand/Exploits
|
|
- https://github.com/superfish9/pt
|
|
- https://github.com/superlink996/chunqiuyunjingbachang
|
|
- https://github.com/svuz/blackbox
|
|
- https://github.com/t0kx/exploit-CVE-2015-1427
|
|
- https://github.com/t0m4too/t0m4to
|
|
- https://github.com/touchmycrazyredhat/myhktools
|
|
- https://github.com/trhacknon/myhktools
|
|
- https://github.com/waqeen/cyber_security21
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/xpgdgit/CVE-2015-1427
|
|
- https://github.com/yulb2020/hello-world
|
|
|