ElasticSearch Smash & Grab

Jess
2 min readJul 26, 2024

While iterating through subdomains I got a response like

You Know, for fun

Judging by the domain it was clearly an AWS instance of OpenSearch running ElasticSearch. I knew a bit about this, but decided to learn more.

There was only one disclosed Hackerone report talking about such a thing: https://hackerone.com/reports/2231261

roland_hack points to using tools like elasticsearch-dump (NPM) and estk (Go). I fired up the dump tool to see what I’d find.

elasticdump --input=https://domain.com/list --output temp222.txt

It spit out a starting dump line and decided to sit for a few hours and never do anything again. So either the tool is dumb, or I am dumb.
Not willing to admit I’m the dumb one I moved on to the estk, which was to be a handy tool to get all the indices of the ES via estk dump -h

Well like all BugBounty folks, my Go environment is a mess and I didn’t feel like spending an hour to clean it up.

Certainly there had to be a better way.

Some googling led me to: https://ghostlulz.com/elastic-search/

And he told me about /_cat/indices?v and /_all/_search?q=email

Boom

That Hit Count is NUTS

After the fact I found this Medium article that has a ton of great info: https://systemweakness.com/elasticsearch-a-easy-win-for-bug-bounty-hunters-how-to-find-and-report-ddd900395bcb

--

--