CVE-2019-7610

Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:48

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHBA-2019:2824 - () https://access.redhat.com/errata/RHBA-2019:2824 -
References () https://access.redhat.com/errata/RHSA-2019:2860 - () https://access.redhat.com/errata/RHSA-2019:2860 -
References () https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 - Vendor Advisory () https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 - Vendor Advisory
References () https://www.elastic.co/community/security - Vendor Advisory () https://www.elastic.co/community/security - Vendor Advisory

Information

Published : 2019-03-25 19:29

Updated : 2024-11-21 04:48


NVD link : CVE-2019-7610

Mitre link : CVE-2019-7610

CVE.ORG link : CVE-2019-7610


JSON object : View

Products Affected

elastic

  • kibana
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')