{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-37285","assignerOrgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","state":"PUBLISHED","assignerShortName":"elastic","dateReserved":"2024-06-05T14:21:14.942Z","datePublished":"2024-11-14T16:49:16.594Z","dateUpdated":"2024-11-14T18:48:27.837Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Kibana","vendor":"Elastic","versions":[{"lessThanOrEqual":"8.15.0","status":"affected","version":"8.10.0","versionType":"semver"}]}],"datePublic":"2024-09-05T15:42:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv\">Elasticsearch indices privileges</a>&nbsp;and <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html\">Kibana privileges</a>&nbsp;assigned to them.<br><br></p><p>The following Elasticsearch indices permissions are required</p><ul><li><code>write</code>&nbsp;privilege on the system indices <code>.kibana_ingest*</code></li><li>The <code>allow_restricted_indices</code>&nbsp;flag is set to <code>true</code></li></ul><p>Any of the following Kibana privileges are additionally required</p><ul><li>Under <code>Fleet</code>&nbsp;the <code>All</code>&nbsp;privilege is granted</li><li>Under <code>Integration</code>&nbsp;the <code>Read</code>&nbsp;or <code>All</code>&nbsp;privilege is granted</li><li>Access to the <code>fleet-setup</code>&nbsp;privilege is gained through the Fleet Server’s service account token</li></ul><p></p><br>"}],"value":"A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific  Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv  and  Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html  assigned to them.\n\n\n\nThe following Elasticsearch indices permissions are required\n\n  *  write privilege on the system indices .kibana_ingest*\n  *  The allow_restricted_indices flag is set to true\n\n\nAny of the following Kibana privileges are additionally required\n\n  *  Under Fleet the All privilege is granted\n  *  Under Integration the Read or All privilege is granted\n  *  Access to the fleet-setup privilege is gained through the Fleet Server’s service account token"}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","shortName":"elastic","dateUpdated":"2024-11-14T16:54:35.562Z"},"references":[{"url":"https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-28/366119"}],"source":{"discovery":"UNKNOWN"},"title":"Kibana arbitrary code execution via YAML deserialization","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"elastic","product":"kibana","cpes":["cpe:2.3:a:elastic:kibana:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"8.10.0","status":"affected","lessThanOrEqual":"8.15.0","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-14T18:46:46.588026Z","id":"CVE-2024-37285","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-14T18:48:27.837Z"}}]}}