CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Several Vulnerabilities Found in Enterprise Search Engine SearchBlox

Various types of vulnerabilities have been identified in SearchBlox, the enterprise search solution built on top of Apache Lucene/Solr and Elasticsearch.

Various types of vulnerabilities have been identified in SearchBlox, the enterprise search solution built on top of Apache Lucene/Solr and Elasticsearch.

According to an advisory posted by the CERT Coordination Center at Carnegie Mellon University, a total of four types of security issues have been uncovered by Qualys researcher Ashish Kamble. The flaws are said to affect SearchBlox 8.1.x and earlier versions.

The expert has found both reflected and persistent cross-site scripting (XSS) vulnerabilities in SearchBlox (CVE-2015-0967). A persistent XSS bug has been identified in the “title” field of the “Create Featured Result” form, but this flaw can only be exploited by an authenticated attacker.

An unrestricted file upload vulnerability (CVE-2015-0968) also plagues SearchBlox. An attacker can exploit this flaw to upload active content, such as JSP pages, to a vulnerable server. Files can be uploaded using the image upload form hosted at /searchblox/admin/uploadImage.html by changing the file’s “Content-Type” to “image/jpeg.” Once the malicious file is uploaded, the attacker can execute it.

The vulnerable page can be accessed even by an unauthenticated attacker, CERT/CC noted. This issue was previously reported back in 2013, but it appears that it wasn’t fixed properly at the time.

Another vulnerability found in SearchBlox is related to the following URL:

http://<HOST_NAME>:9200/_cluster/health?pretty=true

An unauthenticated attacker can access this URL and gain access to potentially sensitive information. This information exposure flaw has been assigned the CVE identifier CVE-2015-0969.

Advertisement. Scroll to continue reading.

Finally, older versions of SearchBlox are affected by a cross-site request forgery (CSRF) weakness that allows an attacker to execute various actions with the victim’s privileges. However, targeted users must have an active session and the attacker must be able to trick them into clicking on a specially crafted link.

“A remote, unauthenticated attacker may be able to execute arbitrary script in the contexts of the end-user’s browser session, the application, or an authenticated user. Sensitive information may be exposed to unauthenticated users,” CERT/CC said regarding the impact of these vulnerabilities.

SearchBlox was informed of the existence of these security holes in late February. The vulnerabilities have been addressed with the release of SearchBlox 8.2, according to CERT/CC. Users are advised to update their installations as soon as possible.

SearchBlox is used by more than 300 organizations across 30 countries. The solution can be used to search information in websites, e-commerce product catalogs, intranet applications, the cloud, and Salesforce.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.