Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

Mar 06, 2025Ravie LakshmananKnowledge Safety / Software program Safety

Elastic has rolled out safety updates to deal with a vital safety flaw impacting the Kibana information visualization dashboard software program for Elasticsearch that would lead to arbitrary code execution.

The vulnerability, tracked as CVE-2025-25012, carries a CVSS rating of 9.9 out of a most of 10.0. It has been described as a case of prototype air pollution.

“Prototype air pollution in Kibana results in arbitrary code execution through a crafted file add and particularly crafted HTTP requests,” the corporate said in an advisory launched Wednesday.

Prototype pollution vulnerability is a security flaw that permits attackers to govern an software’s JavaScript objects and properties, probably resulting in unauthorized information entry, privilege escalation, denial-of-service, or distant code execution.

The vulnerability impacts all variations of Kibana between 8.15.0 and eight.17.3. It has been addressed in model 8.17.3.

Cybersecurity

That stated, in Kibana variations from 8.15.0 and prior to eight.17.1, the vulnerability is exploitable solely by customers with the Viewer position. In Kibana variations 8.17.1 and eight.17.2, it will possibly solely be exploited by customers which have all of the below-mentioned privileges –

  • fleet-all
  • integrations-all
  • actions:execute-advanced-connectors

Customers are suggested to take steps to use the newest fixes to safeguard towards potential threats. Within the occasion speedy patching isn’t an choice, customers are really helpful to set the Integration Assistant characteristic flag to false (“xpack.integration_assistant.enabled: false”) in Kibana’s configuration (“kibana.yml”).

In August 2024, Elastic addressed one other vital prototype air pollution flaw in Kibana (CVE-2024-37287, CVSS rating: 9.9) that would result in code execution. A month later, it resolved two severe deserialization bugs (CVE-2024-37288, CVSS rating: 9.9 and CVE-2024-37285, CVSS rating: 9.1) that would additionally allow arbitrary code execution.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Leave a Reply