The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "elasticsearch", "binary_version": "1.7.3+dfsg-3" }, { "binary_name": "libelasticsearch1.7-java", "binary_version": "1.7.3+dfsg-3" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-1427.json"