Vulnerability identifier: #VU16603
Vulnerability risk: Medium
CVSSv3.1: 8.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-77
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Kibana
Web applications /
Other software
Vendor: Elastic Stack
Description
The vulnerability allows an adjacent attacker to execute arbitrary commands on the target system.
The weakness exists due to an arbitrary file inclusion flaw in the Console plugin. An adjacent attacker with access to the Kibana Console API can send a specially crafted request and execute arbitrary commands with permissions of the Kibana process to execute javascript code on the host system.
Successful exploitation of the vulnerability may result in system compromise.
Mitigation
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.
Vulnerable software versions
Kibana: 5.0.0 - 5.0.2, 5.1.0 - 5.1.2, 5.2.0 - 5.2.2, 5.3.0 - 5.3.3, 5.4.0 - 5.4.3, 5.5.0 - 5.5.3, 5.6.0 - 5.6.12, 6.4.0 - 6.4.2, 6.3.0 - 6.3.2, 6.2.0 - 6.2.4, 6.1.0 - 6.1.4, 6.0.0 - 6.0.1
External links
http://www.cyberark.com/threat-research-blog/execute-this-i-know-you-have-it/
http://www.elastic.co/community/security
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.