First published: Mon Jul 27 2020(Updated: )
Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elasticsearch Kibana | <6.8.11 | |
Elasticsearch Kibana | >=7.0.0<7.8.1 | |
Oracle Communications Billing and Revenue Management | =12.0.0.3.0 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =1.7.0 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Kibana flaw is CVE-2020-7016.
The impact of CVE-2020-7016 is a denial of service (DoS) vulnerability that can cause the Kibana process to consume large amounts of CPU and become unresponsive.
Versions before 6.8.11 and 7.8.1 of Kibana are affected by CVE-2020-7016.
The severity of CVE-2020-7016 is medium, with a severity value of 4.8.
To fix the vulnerability CVE-2020-7016, it is recommended to upgrade to Kibana version 6.8.11 or 7.8.1.