Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ilya Sutskever leads the CEO exit and secure close one

The Y Combinator alumni have launched a new $34 million fund dedicated to YC startups.

Trump administrator illegally killed gender-related health websites, court rules

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Emergency fixes for critical Kibana vulnerabilities that allow for the execution of elastic release remote code
Identity

Emergency fixes for critical Kibana vulnerabilities that allow for the execution of elastic release remote code

userBy userMarch 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 6, 2025Ravi LakshmananData Security/Software Security

Important Kibana Vulnerability

Elastic has deployed security updates to address critical security flaws affecting ElasticSearch’s Kibana Data Visualization Dashboard software that can lead to arbitrary code execution.

The vulnerability tracked as CVE-2025-25012 has a CVSS score of 9.9 out of a maximum of 10.0. It is described as a case of prototype contamination.

“Kibana prototype pollution leads to arbitrary code execution via uploading created files and specifically creating HTTP requests,” the company said in an advisory released Wednesday.

Prototype pollution vulnerabilities are security flaws that allow attackers to manipulate JavaScript objects and properties in applications, which can lead to unauthorized data access, privilege escalation, denial of service, or remote code execution.

The vulnerability affects all versions of Kibana between 8.15.0 and 8.17.3. Addressed in version 8.17.3.

Cybersecurity

That said, in Kibana versions from 8.15.0, vulnerabilities can only be exploited by users with the viewer role in versions prior to 8.17.1. In Kibana versions 8.17.1 and 8.17.2, it is only exploited by users with all of the following privileges –

Fleet-All Integrations-All Action: Execute-Advanced-Connectors

Users are encouraged to take steps to apply the latest fixes to protect against potential threats. If immediate patching is not an option, users are advised to set the Integration Assistant Feature flag to false (“xpack.integration_assistant.enabled:false:false”) (“kibana.yml”).

In August 2024, elasticity addressed another important prototype contamination flaw in Kibana (CVE-2024-37287, CVSS score: 9.9) that could lead to code execution. One month later, two severe deups bugs were resolved (CVE-2024-37288, CVSS score: 9.9 and CVE-2024-37285, CVSS score: 9.1).

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEncrypthub deploys ransomware and steelers via Trojanized Apps, PPI Services, and Phishing
Next Article How will intelligence sharing pause affect Ukraine? |News on the Russian Ukraine War
user
  • Website

Related Posts

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

July 3, 2025

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Steal User Assets

July 3, 2025

The Hidden Weaknesses in AI SOC Tools that No One Talks About

July 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ilya Sutskever leads the CEO exit and secure close one

The Y Combinator alumni have launched a new $34 million fund dedicated to YC startups.

Trump administrator illegally killed gender-related health websites, court rules

Meta has found another way to engage you: message that message first

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.