Elasticsearch - Remote Code Execution (Log4Shell - CVE-2021-44228)
- Severity
- CVSSv3 Score
- 10
- Vulnerability description
- Not available
- Risk description
- Not available
- Recommendation
- Not available
- References
- https://pentest-tools.com/blog/log4shell-scanner-detect-cve-2021-44228/https://pentest-tools.com/blog/how-we-detect-log4shell/https://nvd.nist.gov/vuln/detail/CVE-2021-44228https://logging.apache.org/log4j/2.x/security.htmlhttps://www.elastic.co/blog/new-elasticsearch-and-logstash-releases-upgrade-apache-log4j2https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
- Codename
- Log4Shell
- Detectable with
- Network Scanner
- Scan engine
- Sniper
- Exploitable with Sniper
- No
- CVE Published
- Dec 10, 2021
- Detection added at
- Software Type
- Database
- Vendor
- Elastic
- Product
- Elasticsearch
Detect this vulnerability now!
Check your clients' targets (or your own) for this vulnerability and thousands more! Get proof for validation with our ethical hacking toolkit.