CVE-2020-7013

Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
References
Link Resource
https://www.elastic.co/community/security/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-03 18:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-7013

Mitre link : CVE-2020-7013

CVE.ORG link : CVE-2020-7013


JSON object : View

Products Affected

redhat

  • openshift_container_platform

elastic

  • kibana
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')