A critical security vulnerability identified in Kibana, tracked as CVE-2024-37287, has emerged as a significant threat to data security, with a CVSSv3 severity rating of 9.9. This severe flaw results from a prototype pollution vulnerability, which attackers can exploit if they have access to Machine Learning (ML) and Alerting connector features, as well as write access to internal ML indices. The ability to execute arbitrary code through this vulnerability poses serious risks, making it a high-priority issue for organizations relying on Kibana for data visualization and exploration.
The impact of this vulnerability spans various Kibana environments. It affects self-managed Kibana installations on host operating systems, Kibana Docker images, and Kibana instances across Elastic Cloud and Elastic Cloud Enterprise (ECE). In these environments, Remote Code Execution (RCE) is generally contained within the Docker container, with protections provided by seccomp-bpf and AppArmor profiles. However, the risk remains significant due to the potential for exploitation within these containers. Kibana instances running on Elastic Cloud on Kubernetes (ECK) are also affected, with similar containment measures in place but dependent on proper configuration of seccomp-bpf.
For those using vulnerable versions, specifically Kibana versions below 8.14.2 in the 8.x series and below 7.17.23 in the 7.x series, immediate action is required. Users are strongly advised to upgrade to the latest versions, which include essential patches to address and rectify this vulnerability. Implementing these updates is critical to protecting systems from potential exploitation and maintaining the integrity of data security.
This situation underscores the ongoing necessity for vigilance in software maintenance and security practices. The discovery of this vulnerability serves as a reminder of the importance of timely software updates to safeguard against emerging threats. Organizations that utilize Kibana should prioritize these updates and consult the official Kibana documentation and security advisories for detailed guidance on mitigating the risk associated with this critical flaw.
Reference: