Malicious code vulnerabilities jeopardize Kibana visualization platform
A security update closes two critical vulnerabilities in Kibana.
The Kibana analysis and visualization platform is vulnerable. Attackers can exploit two vulnerabilities and use them to push malicious code onto systems and execute it. A secured version is available for download.
Computer can be compromised
A "critical" vulnerability (CVE-2024-37288) threatens Kibana 8.15.0. Because errors occur when processing data in a YAML document, attackers can execute malicious code. In a warning message, the developers assure that they have closed the gap in version 8.15.1.
If admins are unable to install the security update immediately, there is a temporary alternative to protect PCs from such attacks. To do this, they must make the setting xpack.integration_assistant.enabled: false
in the configuration file kibana.yml.
The security problem is identical for the second"critical" vulnerability (CVE-2024-37285). However, attackers must fulfill several requirements for a successful attack and, for example, allow_restricted_indices flag
must be set to true
.
(des)