Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-7012

Опубликовано: 03 июн. 2020
Источник: redhat
CVSS3: 8.8
EPSS Высокий

Описание

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.

Отчет

The vulnerable functionality was introduced in Kibana 6.7, we ship Kibana 5.6 and it has not been back ported. Additionally, it is a component of the X-Pack, paid additions for Kibana.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11kibanaNot affected
Red Hat OpenShift Container Platform 4kibanaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1849046kibana: Prototype pollution in the Upgrade Assistant could result in arbitrary code execution (ESA-2020-05)

EPSS

Процентиль: 99%
0.73437
Высокий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.

CVSS3: 8.8
debian
больше 5 лет назад

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype ...

github
больше 3 лет назад

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.

EPSS

Процентиль: 99%
0.73437
Высокий

8.8 High

CVSS3