CVE-2019-7609
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
25/03/2019
Last modified:
13/03/2025
Description
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | 5.6.15 (excluding) | |
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.6.1 (excluding) |
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html
- https://access.redhat.com/errata/RHBA-2019:2824
- https://access.redhat.com/errata/RHSA-2019:2860
- https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
- https://www.elastic.co/community/security
- http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html
- https://access.redhat.com/errata/RHBA-2019:2824
- https://access.redhat.com/errata/RHSA-2019:2860
- https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
- https://www.elastic.co/community/security