CVE-2020-7012

Scores

EPSS

0.734medium73.4%
0%20%40%60%80%100%

Percentile: 73.4%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.5

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Description

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

CWEs

CWE-94

Vulnerable Software (2)

Type: Configuration

Product: kibana

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Vendor: *

Product: kibana

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",      "versionEndIncluding": "6.8.8",      "versionStartIncluding": "6.7.0",      "vulnerable": true    },   ...

Source: nvd

End of list