Malicious code vulnerabilities jeopardize Kibana visualization platform
A security update closes two critical vulnerabilities in Kibana.
(Image: Photon photo/Shutterstock.com)
The Kibana analysis and visualization platform is vulnerable. Attackers can exploit two vulnerabilities and use them to push malicious code onto systems and execute it. A secured version is available for download.
Computer can be compromised
A "critical" vulnerability (CVE-2024-37288) threatens Kibana 8.15.0. Because errors occur when processing data in a YAML document, attackers can execute malicious code. In a warning message, the developers assure that they have closed the gap in version 8.15.1.
Videos by heise
If admins are unable to install the security update immediately, there is a temporary alternative to protect PCs from such attacks. To do this, they must make the setting xpack.integration_assistant.enabled: false in the configuration file kibana.yml.
The security problem is identical for the second"critical" vulnerability (CVE-2024-37285). However, attackers must fulfill several requirements for a successful attack and, for example, allow_restricted_indices flag must be set to true.
(des)