Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:CTS:KIBANA-TIMELION-CE

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Elastic Kibana Timelion Prototype Pollution

Release Date

2019/12/18

Update Number

3236

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Elastic Kibana Timelion Prototype Pollution


This signature detects attempts to exploit a known vulnerability against Kibana. A successful attack can lead to Remote Code Execution.

Extended Description

Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

References

  • CVE: CVE-2019-7609
  • URL: https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out