CVE-2020-7012 — Code Injection in Kibana
Severity
8.8HIGHNVD
EPSS
73.4%
top 1.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 3
Latest updateMay 24
Description
Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
kibana: Prototype pollution in the Upgrade Assistant could result in arbitrary code execution (ESA-2020-05)↗2020-06-03
💬Community
1Bugzilla▶
CVE-2020-7012 kibana: Prototype pollution in the Upgrade Assistant could result in arbitrary code execution (ESA-2020-05)↗2020-06-19