{
  "threat_severity" : "Moderate",
  "public_date" : "2020-06-03T00:00:00Z",
  "bugzilla" : {
    "description" : "kibana: Prototype pollution in TSVB could result in arbitrary code execution (ESA-2020-06)",
    "id" : "1849044",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1849044"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.2",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-94",
  "details" : [ "Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system." ],
  "statement" : "To mitigate this vulnerability you can set  \"metrics.enabled: false\" in kibana.yml",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4.6",
    "release_date" : "2020-10-27T00:00:00Z",
    "advisory" : "RHSA-2020:4298",
    "cpe" : "cpe:/a:redhat:openshift:4.6::el8",
    "package" : "openshift4/ose-logging-kibana6:v4.6.0-202010200139.p0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Will not fix",
    "package_name" : "kibana",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Will not fix",
    "package_name" : "kibana",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-7013\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-7013\nhttps://discuss.elastic.co/t/elastic-stack-6-8-9-and-7-7-0-security-update/235571" ],
  "name" : "CVE-2020-7013",
  "csaw" : false
}