Elastic Kibana < 5.6.15, 6.x.x < 6.6.1 RCE Vulnerability (Active Check)

Published: 2019-11-06 03:31:33
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
exploit

Solution Type:
Vendor Patch

Summary:
Kibana contains an arbitrary code execution flaw in the Timelion visualizer.

Detection Method:
Sends multiple crafted HTTP requests and checks the response.

Technical Details:
An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

Affected Versions:
Kibana versions before 5.6.15 and 6.0.0 before 6.6.1.

Recommendations:
Update to version 5.6.15, 6.6.1 or later.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-7609

References:

https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
https://github.com/LandGrey/CVE-2019-7609/

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.