Arbitrary Code Execution in Kibana by Elastic
CVE-2023-31414
8.8HIGH
Summary
Kibana versions 8.0.0 through 8.7.0 are susceptible to an arbitrary code execution vulnerability. This flaw allows an attacker with write access to the Kibana YAML or environment configuration files to inject a malicious payload. Upon execution, this payload could run JavaScript code, enabling the attacker to execute arbitrary commands on the host machine with the same permissions as the Kibana process. This vulnerability emphasizes the importance of securing configuration files and managing user permissions to mitigate potential risks.
Affected Version(s)
Kibana versions 8.0.0 through 8.7.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved