Description
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Remediation
References
http://www.securityfocus.com/bid/106285
https://access.redhat.com/errata/RHBA-2018:3743
https://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594
https://www.elastic.co/community/security
Related Vulnerabilities
CVE-2019-10753 Vulnerability in maven package com.diffplug.gradle.spotless:spotless-eclipse-groovy
CVE-2018-20834 Vulnerability in maven package org.webjars:tar
CVE-2018-11777 Vulnerability in maven package org.apache.hive:hive-exec
CVE-2019-0199 Vulnerability in maven package org.apache.tomcat:tomcat-coyote
CVE-2019-10316 Vulnerability in maven package org.jenkins-ci.plugins:aqua-microscanner