QID 376501

Date Published: 2022-03-31

QID 376501: Kibana Cross-Site Scripting (XSS) Vulnerability (ESA-2022-04)

Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data.

Affected Version:
For self-managed deployments the issue impacts versions 7.15.0, 7.15.1, and 7.15.2
For Elastic Cloud Services, the issue impacts versions 7.15.0 through 7.17.0, and 8.0.0.

QID Detection Logic:(Authenticated)
This authenticated QID checks for Kibana version by running "/usr/share/kibana/bin/kibana --version" command.

QID Detection Logic:(Unauthenticated)
This QID sends a GET request to find if the target is running a vulnerable version of Kibana.
Note: This QID is not checking how Kibana has been deployed

Successful exploitation of these vulnerabilities may affect confidentiality, integrity and availability of the targeted user.

  • CVSS V3 rated as High - 6.1 severity.
  • CVSS V2 rated as Medium - 4.3 severity.
  • Solution
    Vendor has released fix to this vulnerability.

    Customers are advised to refer to ESA-2022-04Workaround:
    As mitigation, users on affected versions can avoid granting users All access to the Index Pattern Management and Saved Object Management features if they should not be able to otherwise create/modify index patterns. Note: index patterns are called data views starting in 8.0.

    CVEs related to QID 376501

    Software Advisories
    Advisory ID Software Component Link
    ESA-2022-04 URL Logo discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447