Bug 1696030 (CVE-2019-7609)

Summary: CVE-2019-7609 kibana: Arbitrary code execution flaw in the Timelion visualizer
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ahardin, aos-bugs, bleanhar, bmontgom, ccoleman, dbecker, dedgar, eparis, jburrell, jcantril, jgoulding, jjoyce, jokerman, jschluet, kbasil, lhh, lpeer, mburns, mchappel, mmagr, nstielau, sclewis, slinaber, sponnaga
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kibana 5.6.15, kibana 6.6.1 Doc Type: If docs needed, set a value
Doc Text:
An arbitrary code execution flaw was found in the Timelion visualizer in Kibana versions before 5.6.15 and 6.6.1. This flaw allows an attacker with access to the Timelion application to send a request that attempts to execute javascript code. This could lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-09-30 18:45:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1732058, 1732059, 1747796    
Bug Blocks: 1696031    

Description Pedro Sampaio 2019-04-04 03:42:16 UTC
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

References:

https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077

Comment 2 Summer Long 2019-04-15 06:09:40 UTC
No versions of Red Hat OpenStack Platform Operational Tools are affected by this flaw.

Comment 3 Dave Baker 2019-07-22 14:45:00 UTC
OpenShift Container Platform 3.11 and 4.1 contain 5.6.13:

$ docker run -ti  registry.redhat.io/openshift3/ose-logging-kibana5:v3.11 rpm -q kibana
kibana-5.6.13-1.el7.x86_64

$ docker run -ti  registry.redhat.io/openshift4/ose-logging-kibana5:4.1 rpm -q kibana
kibana-5.6.13-1.el7.x86_64

(Note openshift3 vs openshift4 in repo;  note v3.11 vs 4.1 in tag)


OpenShift Container Platform 3.10 and earlier pre-date the reported kibana 5 issue.

$ docker run -ti  registry.redhat.io/openshift3/ose-logging-kibana:v3.10 rpm -q kibana
kibana-4.6.4-4.el7.x86_64

docker run -ti  registry.redhat.io/openshift3/ose-logging-kibana:v3.9 rpm -q kibana
kibana-4.6.4-4.el7.x86_64

Comment 6 Dave Baker 2019-09-24 16:52:30 UTC
Based on further analysis, this flaw warrants an "Important" severity, not "Moderate".  Notes to explain differences in CVSS scoring have also been added.

Comment 10 errata-xmlrpc 2019-09-27 01:35:10 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.1

Via RHSA-2019:2860 https://access.redhat.com/errata/RHSA-2019:2860

Comment 11 Product Security DevOps Team 2019-09-30 18:45:39 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-7609