QID 375893
Date Published: 2021-09-30
QID 375893: Kibana Multiple HTML Injection Vulnerability (ESA-2021-23)
Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data.
CVE-2021-37936: It was discovered that kibana was not sanitizing document fields containing html snippets. Using this vulnerability, an attacker with the ability to write documents to an elasticsearch index could inject HTML. When the Discover app highlighted a search term containing the HTML, it would be rendered for the user.
Affected Version:
All versions of Kibana before 7.14.1 are affected by this flaw
QID Detection Logic:(Authenticated)
This authenticated QID checks for Kibana version by running "/usr/share/kibana/bin/kibana --version" command.
QID Detection Logic:(Unauthenticated)
This QID sends a GET request to find if the target is running a vulnerable version of kibana.
Successful exploitation of this vulnerability may allow an attacker with the ability to write documents to an elasticsearch index could inject HTML.
Users can set "doc_table:highlight" to "false" in the Kibana Advanced Settings. Users who do not wish to do this, and are currently on version 7.14.0 should upgrade to version 7.14.1.
- ESA-2021-23 -
www.elastic.co/community/security
CVEs related to QID 375893
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ESA-2021-23 |
|