Количество 5
Количество 5
CVE-2019-7610
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CVE-2019-7610
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CVE-2019-7610
Kibana versions before 6.6.1 contain an arbitrary code execution flaw ...
GHSA-rrx3-4wcg-f297
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
BDU:2019-04796
Уязвимость компонента xpack.security.audit.enabled сервиса визуализации данных Kibana, позволяющая нарушителю выполнить произвольные команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-7610 Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | CVSS3: 8.1 | 1% Низкий | почти 7 лет назад | |
CVE-2019-7610 Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | CVSS3: 9 | 1% Низкий | почти 7 лет назад | |
CVE-2019-7610 Kibana versions before 6.6.1 contain an arbitrary code execution flaw ... | CVSS3: 9 | 1% Низкий | почти 7 лет назад | |
GHSA-rrx3-4wcg-f297 Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | CVSS3: 9 | 1% Низкий | больше 3 лет назад | |
BDU:2019-04796 Уязвимость компонента xpack.security.audit.enabled сервиса визуализации данных Kibana, позволяющая нарушителю выполнить произвольные команды | CVSS3: 9 | 1% Низкий | почти 7 лет назад |
Уязвимостей на страницу