关联漏洞
描述
Elasticsearch Stack Overflow Vulnerability
介绍
# Elasticsearch StackOverflow vulnerability
A flaw was discovered in Elasticsearch, affecting the `_search` API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.
Affected Versions:
Elasticsearch versions from 7.0.0 to 7.17.12 and from 8.0.0 to 8.9.0
Solutions and Mitigations:
The issue is resolved in Elasticsearch 7.17.13 and 8.9.1
**CVSSv3:** 6.5 (Medium) - AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
**CVE ID:** CVE-2023-31419
Ref: [Link](https://discuss.elastic.co/t/elasticsearch-8-9-1-7-17-13-security-update/343297)
## Proof-of-concept
https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419/assets/31594437/52905c60-01e2-4bdb-b6dc-c51267963d7e
文件快照
[4.0K] /data/pocs/25f6df9f30963a65407db1d9a68b07b0b8b881af
├── [1.3K] exploit.py
├── [4.0K] poc
│ └── [3.0M] DoS.mp4
└── [ 734] README.md
1 directory, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。