Computer Security
[EN] securityvulns.ru no-pyccku


Elastic Logstash directory traversal
updated since 14.06.2015
Published:27.07.2015
Source:
SecurityVulns ID:14542
Type:remote
Threat Level:
5/10
Description:Directory traversal in file output plugin.
Affected:ELASTIC : Logstash 1.4
 ELASTIC : Logstash 1.5
CVE:CVE-2015-5378
 CVE-2015-4152 (Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.)
Original documentdocumentKevin Kluge, Logstash vulnerability CVE-2015-5378 (27.07.2015)
 documentELASTIC, Logstash vulnerability CVE-2015-4152 (14.06.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod