🔥 Add CVE-2019-7609

patch-1
Dwi Siswanto 2020-08-16 01:10:27 +07:00
parent ab954d1a83
commit 64cbf896de
1 changed files with 39 additions and 0 deletions

39
cves/CVE-2019-7609.yaml Normal file
View File

@ -0,0 +1,39 @@
id: CVE-2019-7609
info:
name: Kibana Timelion Arbitrary Code Execution
author: dwisiswant0
severity: critical
# Kibana versions before 5.6.15 and 6.6.1
# contain an arbitrary code execution flaw in the Timelion visualizer.
# An attacker with access to the Timelion application could send a request
# that will attempt to execute javascript code.
# This could possibly lead to an attacker executing arbitrary commands
# with permissions of the Kibana process on the host system.
# --
# References:
# - https://github.com/mpgn/CVE-2019-7609
requests:
- method: POST
path:
- "{{BaseURL}}/api/timelion/run"
- "http://{{Hostname}}:5601/api/timelion/run"
headers:
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55"
Content-Type: "application/json; charset=utf-8"
body: "{\"sheet\":[\".es(*)\"],\"time\":{\"from\":\"now-1m\",\"to\":\"now\",\"mode\":\"quick\",\"interval\":\"auto\",\"timezone\":\"Asia/Shanghai\"}}"
matchers-condition: and
matchers:
- type: word
words:
- "seriesList"
part: body
- type: word
words:
- "Content-Type: application/json"
part: header
- type: status
status:
- 200