Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2018-17246 CVE-2018-17244 CVE-2018-17245 |
CWE-ID | CWE-77 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Kibana Web applications / Other software |
Vendor | Elastic Stack |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU16603
Risk: Medium
CVSSv4.0: [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-17246
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows an adjacent attacker to execute arbitrary commands on the target system.
The weakness exists due to an arbitrary file inclusion flaw in the Console plugin. An adjacent attacker with access to the Kibana Console API can send a specially crafted request and execute arbitrary commands with permissions of the Kibana process to execute javascript code on the host system.
Successful exploitation of the vulnerability may result in system compromise.
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.
Vulnerable software versionsKibana: 5.0.0 - 6.4.2
CPE2.3http://www.cyberark.com/threat-research-blog/execute-this-i-know-you-have-it/
http://www.elastic.co/community/security
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16834
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-17244
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an error when request headers are applied to requests using Active Directory, LDAP, Native, or File realms. A remote attacker can obtain potentially sensitive information if the same username is being authenticated concurrently; when used with run as, this can result in the request running as the incorrect user.
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.
Vulnerable software versionsKibana: 4.0 - 6.4.2
CPE2.3http://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16833
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-17245
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a flaw when authorization credentials are used for generating PDF reports, Native, or File realms. A remote attacker can obtain potentially sensitive information if a report requests external resources plaintext credentials are included in the HTTP request that can be recovered by an external resource provider.
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.
Vulnerable software versionsKibana: 4.0 - 6.4.2
CPE2.3 External linkshttp://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.