Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-7012

Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.458
EPSS Ranking 97.5%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.5
Products affected by CVE-2020-7012
  • Elastic » Kibana » Version: 6.7.0
    cpe:2.3:a:elastic:kibana:6.7.0
  • Elastic » Kibana » Version: 6.7.1
    cpe:2.3:a:elastic:kibana:6.7.1
  • Elastic » Kibana » Version: 6.7.2
    cpe:2.3:a:elastic:kibana:6.7.2
  • Elastic » Kibana » Version: 6.8.0
    cpe:2.3:a:elastic:kibana:6.8.0
  • Elastic » Kibana » Version: 6.8.1
    cpe:2.3:a:elastic:kibana:6.8.1
  • Elastic » Kibana » Version: 6.8.2
    cpe:2.3:a:elastic:kibana:6.8.2
  • Elastic » Kibana » Version: 6.8.3
    cpe:2.3:a:elastic:kibana:6.8.3
  • Elastic » Kibana » Version: 6.8.4
    cpe:2.3:a:elastic:kibana:6.8.4
  • Elastic » Kibana » Version: 6.8.5
    cpe:2.3:a:elastic:kibana:6.8.5
  • Elastic » Kibana » Version: 6.8.6
    cpe:2.3:a:elastic:kibana:6.8.6
  • Elastic » Kibana » Version: 6.8.7
    cpe:2.3:a:elastic:kibana:6.8.7
  • Elastic » Kibana » Version: 6.8.8
    cpe:2.3:a:elastic:kibana:6.8.8
  • Elastic » Kibana » Version: 7.0.0
    cpe:2.3:a:elastic:kibana:7.0.0
  • Elastic » Kibana » Version: 7.0.1
    cpe:2.3:a:elastic:kibana:7.0.1
  • Elastic » Kibana » Version: 7.1.0
    cpe:2.3:a:elastic:kibana:7.1.0
  • Elastic » Kibana » Version: 7.1.1
    cpe:2.3:a:elastic:kibana:7.1.1
  • Elastic » Kibana » Version: 7.2.0
    cpe:2.3:a:elastic:kibana:7.2.0
  • Elastic » Kibana » Version: 7.2.1
    cpe:2.3:a:elastic:kibana:7.2.1
  • Elastic » Kibana » Version: 7.3.0
    cpe:2.3:a:elastic:kibana:7.3.0
  • Elastic » Kibana » Version: 7.3.1
    cpe:2.3:a:elastic:kibana:7.3.1
  • Elastic » Kibana » Version: 7.3.2
    cpe:2.3:a:elastic:kibana:7.3.2
  • Elastic » Kibana » Version: 7.3.3
    cpe:2.3:a:elastic:kibana:7.3.3
  • Elastic » Kibana » Version: 7.3.4
    cpe:2.3:a:elastic:kibana:7.3.4
  • Elastic » Kibana » Version: 7.3.5
    cpe:2.3:a:elastic:kibana:7.3.5
  • Elastic » Kibana » Version: 7.3.6
    cpe:2.3:a:elastic:kibana:7.3.6
  • Elastic » Kibana » Version: 7.4.0
    cpe:2.3:a:elastic:kibana:7.4.0
  • Elastic » Kibana » Version: 7.4.1
    cpe:2.3:a:elastic:kibana:7.4.1
  • Elastic » Kibana » Version: 7.4.2
    cpe:2.3:a:elastic:kibana:7.4.2
  • Elastic » Kibana » Version: 7.5.0
    cpe:2.3:a:elastic:kibana:7.5.0
  • Elastic » Kibana » Version: 7.5.1
    cpe:2.3:a:elastic:kibana:7.5.1
  • Elastic » Kibana » Version: 7.5.2
    cpe:2.3:a:elastic:kibana:7.5.2
  • Elastic » Kibana » Version: 7.6.0
    cpe:2.3:a:elastic:kibana:7.6.0
  • Elastic » Kibana » Version: 7.6.1
    cpe:2.3:a:elastic:kibana:7.6.1
  • Elastic » Kibana » Version: 7.6.2
    cpe:2.3:a:elastic:kibana:7.6.2


Contact Us

Shodan ® - All rights reserved