Show plain JSON{"affected_release": [{"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-enterprise-service-catalog-1:3.11.51-1.git.1671.2d16650.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-0:3.11.51-1.git.0.1560686.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-cluster-autoscaler-0:3.11.51-1.git.0.0aa9fc2.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-descheduler-0:3.11.51-1.git.300.89070e8.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-dockerregistry-0:3.11.51-1.git.446.d29ce0e.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-metrics-server-0:3.11.51-1.git.52.03e3a91.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-node-problem-detector-0:3.11.51-1.git.254.22189b0.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-service-idler-0:3.11.51-1.git.14.813574a.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "atomic-openshift-web-console-0:3.11.51-1.git.324.0ae64ed.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "cri-o-0:1.11.10-1.rhaos3.11.git42c86f0.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-openshift-oauth-proxy-0:3.11.51-1.git.419.1af74df.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-alertmanager-0:3.11.51-1.git.0.50a0687.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-node_exporter-0:3.11.51-1.git.1063.12dd8be.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "golang-github-prometheus-prometheus-0:3.11.51-1.git.5023.0ad933c.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "jenkins-0:2.138.2.1542054911-1.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "jenkins-2-plugins-0:3.11.1542061886-1.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "kibana-0:5.6.13-1.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-ansible-0:3.11.51-2.git.0.51c90a3.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-enterprise-autoheal-0:3.11.51-1.git.219.8ea4275.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-enterprise-cluster-capacity-0:3.11.51-1.git.380.ffa21af.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-monitor-project-lifecycle-0:3.11.51-1.git.59.7b59e29.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}, {"advisory": "RHBA-2018:3743", "cpe": "cpe:/a:redhat:openshift:3.11::el7", "package": "openshift-monitor-sample-app-0:3.11.51-1.git.5.f6d0188.el7", "product_name": "Red Hat OpenShift Container Platform 3.11", "release_date": "2018-12-12T00:00:00Z"}], "bugzilla": {"description": "kibana: Arbitrary file inclusion vulnerability in the Console plugin", "id": "1647344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647344"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.3", "cvss3_scoring_vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "status": "verified"}, "cwe": "CWE-20->CWE-73->CWE-470", "details": ["Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.", "Kibana, before 6.4.3 and 5.6.13, contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute JavaScript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system."], "name": "CVE-2018-17246", "package_state": [{"cpe": "cpe:/a:redhat:openshift:3.10", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.10"}, {"cpe": "cpe:/a:redhat:openshift:3.2", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.2"}, {"cpe": "cpe:/a:redhat:openshift:3.3", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.3"}, {"cpe": "cpe:/a:redhat:openshift:3.4", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.4"}, {"cpe": "cpe:/a:redhat:openshift:3.5", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.5"}, {"cpe": "cpe:/a:redhat:openshift:3.6", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.6"}, {"cpe": "cpe:/a:redhat:openshift:3.7", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.7"}, {"cpe": "cpe:/a:redhat:openshift:3.9", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 3.9"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:3.0", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenShift Enterprise 3.0"}, {"cpe": "cpe:/a:redhat:openstack-optools:8", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenStack Platform 8 (Liberty) Operational Tools"}, {"cpe": "cpe:/a:redhat:openstack-optools:9", "fix_state": "Not affected", "package_name": "kibana", "product_name": "Red Hat OpenStack Platform 9 (Mitaka) Operational Tools"}], "public_date": "2018-11-06T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-17246\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-17246\nhttps://www.elastic.co/community/security"], "threat_severity": "Important"}