Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Demonstration of CVE-2014-3120 | https://github.com/jeffgeiger/es_inject | POC Details |
| 2 | POC Code to exploite CVE-2014-3120 | https://github.com/echohtp/ElasticSearch-CVE-2014-3120 | POC Details |
| 3 | None | https://github.com/xpgdgit/CVE-2014-3120 | POC Details |
| 4 | The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-3120.yaml | POC Details |
| 5 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/elasticsearch-cve-2014-3120.yml | POC Details |
| 6 | https://github.com/vulhub/vulhub/blob/master/elasticsearch/CVE-2014-3120/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet