Elastic, the company behind Kibana, has released critical security updates to address a high-severity vulnerability identified as CVE-2024-12556.
The flaw, referred to as “Kibana Prototype Pollution,” could allow attackers to execute arbitrary code by exploiting a combination of unrestricted file uploads and path traversal.
The vulnerability, which carries a CVSS score of 8.7 (High), impacts multiple versions of Kibana, a widely used data visualization platform.
Elastic has urged users to update to the latest patched versions to mitigate potential risks.
CVE-2024-12556 is linked to prototype pollution in Kibana’s integration assistant feature. Exploitation requires attackers to have authenticated, low-privilege access to the platform and user interaction.
Successful attacks can lead to code injection, resulting in severe implications such as the compromise of sensitive data or operational disruptions.
Affected Products
The vulnerability affects the following Kibana versions:
Product | Affected Versions | Patched Versions |
Kibana | 8.16.1 to 8.17.1 | 8.16.4, 8.17.2, or later |
Elastic strongly recommends users on affected versions to upgrade to 8.16.4, 8.17.2, or higher to address the security flaw.
For organizations unable to upgrade immediately, Elastic has outlined a temporary mitigation strategy. Users can disable the vulnerable integration assistant feature by editing the kibana.yml configuration file:
xpack.integration_assistant.enabled: false
This measure will prevent exploitation but is not a substitute for applying the patched versions.
Severity and Impact
This vulnerability poses a significant risk to organizations using affected Kibana versions, as it could allow attackers to inject malicious code into their systems.
Elastic’s swift response emphasizes its commitment to security, but the incident highlights the importance of proactive patch management within organizations.
The advisory provides additional details for administrators and security teams to implement the recommended fixes.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…
The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…
Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…
Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…
Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…
Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…