Bug 1865759 (CVE-2020-7016) - CVE-2020-7016 kibana: DoS in Timelion
Summary: CVE-2020-7016 kibana: DoS in Timelion
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-7016
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1871822 1871823
Blocks: 1865761
TreeView+ depends on / blocked
 
Reported: 2020-08-04 04:52 UTC by Dhananjay Arunesh
Modified: 2021-10-28 08:25 UTC (History)
9 users (show)

Fixed In Version: kibana 7.8.1, kibana 6.8.11
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in kibana’s Timelion component. This flaw allows an attacker to construct a URL that can lead to the kibana process consuming large amounts of CPU and becoming unresponsive when viewed by a kibana user. The highest threat from this vulnerability is to system availability.
Clone Of:
Environment:
Last Closed: 2021-10-28 08:25:14 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2020-08-04 04:52:10 UTC
Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive.

References:
https://discuss.elastic.co/t/elastic-stack-6-8-11-and-7-8-1-security-update/242786
https://www.elastic.co/community/security/

Comment 9 Przemyslaw Roguski 2020-08-25 07:39:05 UTC
Statement:

In Red Hat OpenShift Container Platform (RHOCP) the affected Kibana component is behind OpenShift OAuth authentication. This restricts access to the vulnerable Timelion Kibana component to authenticated users only, therefore the impact is Low.

Red Hat OpenShift Container Platform 4 delivers Kibana package where the Timelion tool is used, but due to the code changing to the container first content the kibana package is marked as wontfix. This may be fixed in the future.


Note You need to log in before you can comment on or make changes to this bug.