Skip to main content

Tool for testing Elasticsearch vulnerabilities and misconfigurations.

Project description

penterepTools

PTELASTIC

Security testing tool for identifying, fingerprinting, and exploiting vulnerabilities in Elasticsearch instances.
The tool:

  • Identifies whether or not Elasticsearch is running on a host
  • Identifies whether it is running on HTTP or HTTPS
  • Identifies whether or not it has authentication enabled
  • Enumerates:
    • Elasticsearch version
    • Modules, their version and description
    • Installed plugins and their version
    • Users, their roles and privileges
  • Tests for the following CVEs:
    • CVE-2015-5531
    • CVE-2015-1427
    • CVE-2014-3120
    • CVE-2015-3337
    • any other CVE the host might be vulnerable to
  • Dumps:
    • Structure of indices
    • Data from indices

Installation

pip install ptelastic

Adding to PATH

If you're unable to invoke the script from your terminal, it's likely because it's not included in your PATH. You can resolve this issue by executing the following commands, depending on the shell you're using:

For Bash Users

echo "export PATH=\"`python3 -m site --user-base`/bin:\$PATH\"" >> ~/.bashrc
source ~/.bashrc

For ZSH Users

echo "export PATH=\"`python3 -m site --user-base`/bin:\$PATH\"" >> ~/.zshrc
source ~/.zshrc

Usage examples

ptelastic -u https://www.example.com/

Options

   -u   --url                              <url>                             Connect to URL
   -ts  --tests                            <test>                            Specify one or more tests to perform:
                                            AUTH                             Elasticsearch authentication test
                                            CVE-2014-3120                    Elasticsearch CVE-2014-3120 test
                                            CVE-2015-1427                    Elasticsearch CVE-2015-1427 test
                                            CVE-2015-3337                    Elasticsearch CVE-2015-3337 test
                                            CVE-2015-5531                    Elasticsearch CVE-2015-5531 test
                                            CVE-LOOKUP                       Elasticsearch CVE lookup
                                            DATA_DUMP                        Elasticsearch data dump module
                                            HTTPS                            Elasticsearch HTTP/S test
                                            IS_ELASTIC                       Elasticsearch availability test
                                            STRUCTURE_DUMP                   Elasticsearch data structure test
                                            SW                               Elasticsearch software test
                                            USERS                            Elasticsearch user enumeration
                                                                               
   -p   --proxy                            <proxy>                           Set proxy (e.g. http://127.0.0.1:8080)
   -T   --timeout                          <miliseconds>                     Set timeout (default 10)
   -t   --threads                          <threads>                         Set thread count (default 10)
   -c   --cookie                           <cookie>                          Set cookie
   -a   --user-agent                       <a>                               Set User-Agent header
   -H   --headers                          <header:value>                    Set custom header(s)
   -r   --redirects                                                          Follow redirects (default False)
   -vv  --verbose                                                            Enable verbose mode
   -v   --version                                                            Show script version and exit
   -h   --help                                                               Show this help message and exit
   -j   --json                                                               Output in JSON format
   -U   --user                                                               Set user to authenticate as
   -P   --password                                                           Set password to authenticate with
   -F   --file                             </path/to/file>                   File to read if host is vulnerable to CVE-2015-5531 (default /etc/passwd)
   -di  --dump-index<index1, index2, ...>  Specify index to dump with data_dump module
   -df  --dump-field                       <field1,field2, field3.subfield>  Specify fields to dump with data_dump module
   -o   --output                           <filename>                        Specify the name of the file to store structure/data dump to
   -b   --built-in                                                           Enumerate/dump built-in Elasticsearch indexes

Dependencies

ptlibs>=1.0.32
packaging
requests

License

Copyright (c) 2025 Penterep Security s.r.o.

ptelastic is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

ptelastic is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with ptelastic. If not, see https://www.gnu.org/licenses/.

Warning

You are only allowed to run the tool against the websites which you have been given permission to pentest. We do not accept any responsibility for any damage/harm that this application causes to your computer, or your network. Penterep is not responsible for any illegal or malicious use of this code. Be Ethical!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ptelastic-0.0.20.tar.gz (35.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ptelastic-0.0.20-py3-none-any.whl (45.9 kB view details)

Uploaded Python 3

File details

Details for the file ptelastic-0.0.20.tar.gz.

File metadata

  • Download URL: ptelastic-0.0.20.tar.gz
  • Upload date:
  • Size: 35.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for ptelastic-0.0.20.tar.gz
Algorithm Hash digest
SHA256 4ba19fe678fccbd39f118f05244ce55d7ff698e9de77d2d6d241282abda201cc
MD5 df36144ea8938b4717170b63b8cfab6d
BLAKE2b-256 60e66d6ca2f455c4554296fe8618e9fe41632c9f7820e8281737e0b7de544137

See more details on using hashes here.

File details

Details for the file ptelastic-0.0.20-py3-none-any.whl.

File metadata

  • Download URL: ptelastic-0.0.20-py3-none-any.whl
  • Upload date:
  • Size: 45.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for ptelastic-0.0.20-py3-none-any.whl
Algorithm Hash digest
SHA256 a23ec377defc13115fb12877b5acc13452d5d701248d7f24c75024cbde6562a1
MD5 9c5d8a6b4311a63398ff53001635591c
BLAKE2b-256 ff5d67be018ac5194ff4500a34dd574e1a2ee3e1c2b97a796ebf47df03324d06

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page