First published: Wed Jun 03 2020(Updated: )
Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kibana | <7.7.0 | 7.7.0 |
redhat/kibana | <6.8.9 | 6.8.9 |
Elastic Kibana | <6.8.9 | |
Elastic Kibana | >=7.0.0<7.7.0 | |
Redhat Openshift Container Platform | =3.11 | |
Redhat Openshift Container Platform | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7013 is a vulnerability in Kibana versions before 6.8.9 and 7.7.0 that allows authenticated attackers with privileges to create TSVB visualizations to execute arbitrary code.
CVE-2020-7013 has a severity rating of 7.2 (High).
To fix CVE-2020-7013, you need to upgrade Kibana to version 6.8.9 or 7.7.0.
You can find more information about CVE-2020-7013 on the CVE website, NIST NVD, Elastic forums, and Red Hat Bugzilla.
The Common Weakness Enumeration (CWE) of CVE-2020-7013 is CWE-94 (Improper Control of Generation of Code ('Code Injection')).