CVE-2024-37288Deserialization of Untrusted Data in Kibana

Severity
8.8HIGHNVD
CNA9.9
EPSS
1.9%
top 16.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 9

Description

A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5elastic/kibana8.15.0
NVDelastic/kibana8.15.0

🔴Vulnerability Details

2
CVEList
CVE-2024-37288: A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload2024-09-09
GHSA
GHSA-ph9f-2c4w-rghv: A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload2024-09-09
CVE-2024-37288 — Deserialization of Untrusted Data | cvebase