Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/kibana-8-7-1-security-updates/332330 | Vendor Advisory |
https://www.elastic.co/community/security/ | Vendor Advisory |
Configurations
History
11 May 2023, 13:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://www.elastic.co/community/security/ - Vendor Advisory | |
References | (MISC) https://discuss.elastic.co/t/kibana-8-7-1-security-updates/332330 - Vendor Advisory |
04 May 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-04 21:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-31414
Mitre link : CVE-2023-31414
CVE.ORG link : CVE-2023-31414
JSON object : View
Products Affected
elastic
- kibana
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')