Описание
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
An arbitrary code execution flaw was found in Kibana in versions prior to 5.6.15 and 6.6.1. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Отчет
Red Hat OpenStack Platform 8.0/9.0 Operational Tools Kibana/Elasticsearch versions do not include nor support X-Pack (8/9 versions must use the optional Shield, also not packaged); not affected. Red Hat OpenShift Container Platform 4.1, and 3.x do not install the vulnerable package (Shield for Kibana 4, and X-Pack for Kibana 5), so the impact is lowered to moderate.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.10 | kibana | Not affected | ||
| Red Hat OpenShift Container Platform 3.11 | kibana | Not affected | ||
| Red Hat OpenShift Container Platform 3.6 | kibana | Not affected | ||
| Red Hat OpenShift Container Platform 3.7 | kibana | Not affected | ||
| Red Hat OpenShift Container Platform 3.9 | kibana | Not affected | ||
| Red Hat OpenStack Platform 8 (Liberty) Operational Tools | kibana | Not affected | ||
| Red Hat OpenStack Platform 9 (Mitaka) Operational Tools | kibana | Not affected | ||
| Red Hat OpenShift Container Platform 3.11 | openshift3/apb-base | Fixed | RHBA-2019:2824 | 24.09.2019 |
| Red Hat OpenShift Container Platform 3.11 | openshift3/apb-tools | Fixed | RHBA-2019:2824 | 24.09.2019 |
| Red Hat OpenShift Container Platform 3.11 | openshift3/automation-broker-apb | Fixed | RHBA-2019:2824 | 24.09.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.1 High
CVSS3
Связанные уязвимости
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Kibana versions before 6.6.1 contain an arbitrary code execution flaw ...
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Уязвимость компонента xpack.security.audit.enabled сервиса визуализации данных Kibana, позволяющая нарушителю выполнить произвольные команды
EPSS
8.1 High
CVSS3