Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 04:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/errata/RHBA-2019:2824 - | |
| References | () https://access.redhat.com/errata/RHSA-2019:2860 - | |
| References | () https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 - Vendor Advisory | |
| References | () https://www.elastic.co/community/security - Vendor Advisory | 
Information
                Published : 2019-03-25 19:29
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7610
Mitre link : CVE-2019-7610
CVE.ORG link : CVE-2019-7610
JSON object : View
Products Affected
                elastic
- kibana
