Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "source": "https://github.com/elastic/elasticsearch/commit/4d5320bd33d4392a48dda37c4602dbe1b6a5b6cb", "signature_version": "v1", "target": { "file": "test/framework/src/main/java/org/elasticsearch/test/discovery/ClusterDiscoveryConfiguration.java", "function": "unicastHostPorts" }, "digest": { "function_hash": "301237062243750302052828055619886557208", "length": 745.0 }, "id": "CVE-2018-17246-1071202d" }, { "deprecated": false, "signature_type": "Line", "source": "https://github.com/elastic/elasticsearch/commit/4d5320bd33d4392a48dda37c4602dbe1b6a5b6cb", "signature_version": "v1", "target": { "file": "test/framework/src/main/java/org/elasticsearch/test/discovery/ClusterDiscoveryConfiguration.java" }, "digest": { "threshold": 0.9, "line_hashes": [ "174016456637773374405263839854623907758", "65899717440937260928258610683341589212", "140206647680195545314612796676295510306", "178752616638806026573619557373683246684" ] }, "id": "CVE-2018-17246-9d70779f" } ] }