QID 375893

Date Published: 2021-09-30

QID 375893: Kibana Multiple HTML Injection Vulnerability (ESA-2021-23)

Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data.

CVE-2021-37936: It was discovered that kibana was not sanitizing document fields containing html snippets. Using this vulnerability, an attacker with the ability to write documents to an elasticsearch index could inject HTML. When the Discover app highlighted a search term containing the HTML, it would be rendered for the user.

Affected Version:
All versions of Kibana before 7.14.1 are affected by this flaw

QID Detection Logic:(Authenticated)
This authenticated QID checks for Kibana version by running "/usr/share/kibana/bin/kibana --version" command.

QID Detection Logic:(Unauthenticated)
This QID sends a GET request to find if the target is running a vulnerable version of kibana.

Successful exploitation of this vulnerability may allow an attacker with the ability to write documents to an elasticsearch index could inject HTML.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Vendor has released fix to this vulnerability.Customers are advised to refer to ESA-2021-23 for more information. Workaround:
    Users can set "doc_table:highlight" to "false" in the Kibana Advanced Settings. Users who do not wish to do this, and are currently on version 7.14.0 should upgrade to version 7.14.1.

    Vendor References

    CVEs related to QID 375893

    Software Advisories
    Advisory ID Software Component Link
    ESA-2021-23 URL Logo www.elastic.co/community/security