CVE-2018-17246
20.12.2018, 22:29
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.Enginsight
Vendor | Product | Version |
---|---|---|
elastic | kibana | 5.0.0 ≤ 𝑥 < 5.6.13 |
elastic | kibana | 6.0.0 ≤ 𝑥 < 6.4.3 |
redhat | openshift_container_platform | 3.11 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-73 - External Control of File Name or PathThe software allows user input to control or influence paths or file names that are used in filesystem operations.
- CWE-829 - Inclusion of Functionality from Untrusted Control SphereThe software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
References