Kibana 8.10.x < 8.15.1 (ESA-2024-28)

critical Nessus Plugin ID 207060

Synopsis

The remote host is missing a security update.

Description

The version of Kibana installed on the remote host is prior to 8.15.1. It is, therefore, affected by a vulnerability as referenced in the ESA-2024-28 advisory.

- A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Kibana version 8.15.1 or later.

See Also

http://www.nessus.org/u?195c402a

Plugin Details

Severity: Critical

ID: 207060

File Name: kibana_ESA-2024-28.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 9/12/2024

Updated: 9/13/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-37285

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:elasticsearch:kibana

Required KB Items: installed_sw/Kibana

Exploit Ease: No known exploits are available

Patch Publication Date: 9/5/2024

Vulnerability Publication Date: 9/5/2024

Reference Information

CVE: CVE-2024-37285

IAVB: 2024-B-0131