Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ph9f-2c4w-rghv

Опубликовано: 09 сент. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.9

Описание

A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .

A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .

EPSS

Процентиль: 82%
0.0163
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.9
nvd
больше 1 года назад

A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .

CVSS3: 9.9
debian
больше 1 года назад

A deserialization issue in Kibana can lead to arbitrary code execution ...

CVSS3: 9.9
fstec
больше 1 года назад

Уязвимость сервиса визуализации данных Kibana, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 82%
0.0163
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-502