Elastic Kibana < 5.6.15, 6.x.x < 6.6.1 RCE Vulnerability (Active Check)

Technical Details

Severity Level:

High Severity

CVSS Score:

10.0

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
exploit

Solution Type:
Vendor Patch

Summary:
Kibana contains an arbitrary code execution flaw in the Timelion visualizer.

Detection Method:
Sends multiple crafted HTTP requests and checks the response.

Technical Details:
An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

Affected Versions:
Kibana versions before 5.6.15 and 6.0.0 before 6.6.1.

Recommendations:
Update to version 5.6.15, 6.6.1 or later.

Family:

Web application abuses

Creation Time:

2019-11-06 03:31:33

Modification Time:

2019-11-05 06:24:15

Find and Fix this Vulnerability:

Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition

NVD CVE ID:
CVE-2019-7609

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.