CVE-2018-17246

CRITICAL EXPLOITED NUCLEI

Kibana <6.4.3, 5.6.13 - Code Injection

Title source: llm

Description

Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

Exploits (2)

nomisec WORKING POC 66 stars
by mpgn · remote
https://github.com/mpgn/CVE-2018-17246
nomisec WORKING POC
by Almandev · poc
https://github.com/Almandev/Sub-folderFetcher

Nuclei Templates (1)

Kibana - Local File Inclusion
CRITICALby princechaddha,thelicato
Shodan: http.title:"kibana"
FOFA: title="kibana"

Scores

CVSS v3 9.8
EPSS 0.9378
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-11-13

Classification

CWE
CWE-829 CWE-73
Status published

Affected Products (2)

elastic/kibana < 5.6.13
redhat/openshift_container_platform

Timeline

Published Dec 20, 2018
Tracked Since Feb 18, 2026