Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-7610

Опубликовано: 19 фев. 2019
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

An arbitrary code execution flaw was found in Kibana in versions prior to 5.6.15 and 6.6.1. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Red Hat OpenStack Platform 8.0/9.0 Operational Tools Kibana/Elasticsearch versions do not include nor support X-Pack (8/9 versions must use the optional Shield, also not packaged); not affected. Red Hat OpenShift Container Platform 4.1, and 3.x do not install the vulnerable package (Shield for Kibana 4, and X-Pack for Kibana 5), so the impact is lowered to moderate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10kibanaNot affected
Red Hat OpenShift Container Platform 3.11kibanaNot affected
Red Hat OpenShift Container Platform 3.6kibanaNot affected
Red Hat OpenShift Container Platform 3.7kibanaNot affected
Red Hat OpenShift Container Platform 3.9kibanaNot affected
Red Hat OpenStack Platform 8 (Liberty) Operational ToolskibanaNot affected
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolskibanaNot affected
Red Hat OpenShift Container Platform 3.11openshift3/apb-baseFixedRHBA-2019:282424.09.2019
Red Hat OpenShift Container Platform 3.11openshift3/apb-toolsFixedRHBA-2019:282424.09.2019
Red Hat OpenShift Container Platform 3.11openshift3/automation-broker-apbFixedRHBA-2019:282424.09.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1696032kibana: Audit logging Remote Code Execution issue

EPSS

Процентиль: 78%
0.01098
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9
nvd
почти 7 лет назад

Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

CVSS3: 9
debian
почти 7 лет назад

Kibana versions before 6.6.1 contain an arbitrary code execution flaw ...

CVSS3: 9
github
больше 3 лет назад

Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

CVSS3: 9
fstec
почти 7 лет назад

Уязвимость компонента xpack.security.audit.enabled сервиса визуализации данных Kibana, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 78%
0.01098
Низкий

8.1 High

CVSS3