Kibana ESA-2018-18

critical Nessus Plugin ID 118798

Synopsis

Based on its self-reported version, the remote web server hosts a Java application which is affected by an arbitrary file inclusion vulnerability.

Description

Nethanel Coppenhagen of CyberArk Labs discovered Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code.
This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Users should upgrade to Elastic Stack version 6.4.3 or 5.6.13 or later. Users unable to upgrade their installations should refer to the mitigation instructions outlined in the vendor advisory.

See Also

http://www.nessus.org/u?3f00797e

Plugin Details

Severity: Critical

ID: 118798

File Name: kibana_esa_2018_18.nasl

Version: 1.4

Type: remote

Family: CGI abuses

Published: 11/7/2018

Updated: 7/25/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-17246

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:elasticsearch:kibana

Required KB Items: installed_sw/Kibana

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/6/2018

Vulnerability Publication Date: 11/6/2018

Reference Information

CVE: CVE-2018-17246