First published: Wed Jun 03 2020(Updated: )
Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Kibana | >=6.7.0<=6.8.8 | |
Elastic Kibana | >=7.0.0<=7.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7012 is a vulnerability in Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 that allows an attacker to execute arbitrary code.
CVE-2020-7012 has a severity rating of 8.8 (high).
Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 are affected by CVE-2020-7012.
An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code.
Yes, Elastic has released a patch to fix CVE-2020-7012. It is recommended to update to the latest version of Kibana.