Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHBA-2019:2824 - | |
References | () https://access.redhat.com/errata/RHSA-2019:2860 - | |
References | () https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 - Vendor Advisory | |
References | () https://www.elastic.co/community/security - Vendor Advisory |
Information
Published : 2019-03-25 19:29
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7610
Mitre link : CVE-2019-7610
CVE.ORG link : CVE-2019-7610
JSON object : View
Products Affected
elastic
- kibana