Prototype Pollution Vulnerability in Kibana Allows Arbitrary Code Execution
CVE-2024-37287
Key Information:
Badges
Summary
Summary: A critical security flaw has been identified in Kibana, a popular open-source data visualization and exploration tool, with a vulnerability that allows attackers to execute arbitrary code. The vulnerability, tracked as CVE-2024-37287, has a critical severity rating and affects various Kibana environments, including self-managed installations, instances running the Kibana Docker image, and those on Elastic Cloud. Users are strongly advised to upgrade to Kibana version 8.14.2 or 7.17.23 to address the flaw and protect their systems. There are no known exploitations in the wild by ransomware groups at this time.
Affected Version(s)
Kibana 7.7.0, 8.0.0 < 7.17.23, 8.14.2
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
Elasticsearch Kibana Arbitrary Code Execution Vulnerability (CVE-2024-37287) β Qualys ThreatPROTECT
Skip to content Kibana, a data visualization tool, released a patch to address a critical severity flaw that may allow an attacker to perform arbitrary code execution on target systems. Tracked as...
6 months ago
Critical Kibana Vulnerability Let Attackers Execute Arbitrary Code
A critical security flaw has been identified in Kibana, a popular open-source data visualization and exploration tool.
6 months ago
References
CVSS V3.1
Timeline
Vulnerability published
- πΎ
Exploit known to exist
- π°
First article discovered by CybersecurityNews
Vulnerability Reserved