First published: Fri Dec 08 2017(Updated: )
Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Kibana | =5.6.0 | |
Elastic Kibana | =5.6.1 | |
Elastic Kibana | =5.6.2 | |
Elastic Kibana | =5.6.3 | |
Elastic Kibana | =5.6.4 | |
Elastic Kibana | =6.0.0 | |
Elastic Kibana | =6.0.0-alpha1 | |
Elastic Kibana | =6.0.0-alpha2 | |
Elastic Kibana | =6.0.0-beta1 | |
Elastic Kibana | =6.0.0-beta2 | |
Elastic Kibana | =6.0.0-rc1 | |
Elastic Kibana | =6.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Kibana vulnerability is CVE-2017-11481.
CVE-2017-11481 has a severity level of 6.1, which is considered medium.
The affected software for CVE-2017-11481 is Kibana versions prior to 6.0.1 and 5.6.5.
Yes, a fix is available for CVE-2017-11481. Users should update to Kibana version 6.0.1 or 5.6.5.
More information about CVE-2017-11481 can be found at the following link: https://discuss.elastic.co/t/kibana-6-0-1-and-5-6-5-security-update/110571