#VU16603 File inclusion in Kibana


Published: 2018-12-19

Vulnerability identifier: #VU16603

Vulnerability risk: Medium

CVSSv3.1: 8.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17246

CWE-ID: CWE-77

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Kibana
Web applications / Other software

Vendor: Elastic Stack

Description
The vulnerability allows an adjacent attacker to execute arbitrary commands on the target system.

The weakness exists due to an arbitrary file inclusion flaw in the Console plugin. An adjacent attacker with access to the Kibana Console API can send a specially crafted request and execute arbitrary commands with permissions of the Kibana process to execute javascript code on the host system.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.

Vulnerable software versions

Kibana: 5.0.0 - 5.0.2, 5.1.0 - 5.1.2, 5.2.0 - 5.2.2, 5.3.0 - 5.3.3, 5.4.0 - 5.4.3, 5.5.0 - 5.5.3, 5.6.0 - 5.6.12, 6.4.0 - 6.4.2, 6.3.0 - 6.3.2, 6.2.0 - 6.2.4, 6.1.0 - 6.1.4, 6.0.0 - 6.0.1


External links
http://www.cyberark.com/threat-research-blog/execute-this-i-know-you-have-it/
http://www.elastic.co/community/security


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability