CVE-2020-7013

Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://www.elastic.co/community/security/ - Vendor Advisory () https://www.elastic.co/community/security/ - Vendor Advisory

Information

Published : 2020-06-03 18:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-7013

Mitre link : CVE-2020-7013

CVE.ORG link : CVE-2020-7013


JSON object : View

Products Affected

elastic

  • kibana

redhat

  • openshift_container_platform
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')