#VU16603 File inclusion in Kibana - CVE-2018-17246
Published: December 19, 2018
Vulnerability identifier: #VU16603
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2018-17246
CWE-ID: CWE-77
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
Kibana
Kibana
Software vendor:
Elastic Stack
Elastic Stack
Description
The vulnerability allows an adjacent attacker to execute arbitrary commands on the target system.
The weakness exists due to an arbitrary file inclusion flaw in the Console plugin. An adjacent attacker with access to the Kibana Console API can send a specially crafted request and execute arbitrary commands with permissions of the Kibana process to execute javascript code on the host system.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to an arbitrary file inclusion flaw in the Console plugin. An adjacent attacker with access to the Kibana Console API can send a specially crafted request and execute arbitrary commands with permissions of the Kibana process to execute javascript code on the host system.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.