Vulnerability Name:

CVE-2018-3824 (CCN-150286)

Assigned:2018-04-17
Published:2018-04-17
Updated:2019-10-09
Summary:X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. If an attacker is able to inject data into an index that has a ML job running against it, then when another user views the results of the ML job it could allow the attacker to obtain sensitive information from or perform destructive actions on behalf of that other ML user.
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
5.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2018-3824

Source: CCN
Type: Elastic Web site
Elastic Stack 6.2.4 and 5.6.9 security update

Source: CONFIRM
Type: Vendor Advisory
https://discuss.elastic.co/t/elastic-stack-6-2-4-and-5-6-9-security-update/128422

Source: XF
Type: UNKNOWN
elastic-cve20183824-xss(150286)

Source: CONFIRM
Type: Vendor Advisory
https://www.elastic.co/community/security

Source: CCN
Type: IBM Security Bulletin 6493267 (Business Automation Workflow)
Multiple vulnerabilities may affect IBM Business Automation Workflow and IBM Business Process Manager (BPM) offline documentation

Source: CCN
Type: IBM Security Bulletin 6601523 (Tivoli Netcool/Impact)
Multiple security vulnerabilities have been identified in Elasticsearch shipped with IBM Tivoli Netcool Impact

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2018-3824

Vulnerable Configuration:Configuration 1:
  • cpe:/a:elastic:elasticsearch_x-pack:*:*:*:*:*:*:*:* (Version < 5.6.9)
  • OR cpe:/a:elastic:elasticsearch_x-pack:*:*:*:*:*:*:*:* (Version >= 6.0.0 and < 6.2.4)

  • Configuration 2:
  • cpe:/a:elastic:kibana_x-pack:*:*:*:*:*:*:*:* (Version < 5.6.9)
  • OR cpe:/a:elastic:kibana_x-pack:*:*:*:*:*:*:*:* (Version >= 6.0.0 and < 6.2.4)

  • Configuration 3:
  • cpe:/a:elastic:logstash_x-pack:*:*:*:*:*:*:*:* (Version < 5.6.9)
  • OR cpe:/a:elastic:logstash_x-pack:*:*:*:*:*:*:*:* (Version >= 6.1.0 and < 6.2.4)

  • Configuration CCN 1:
  • cpe:/a:elastic:elasticsearch:6.2.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:tivoli_netcool/impact:7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:21.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    elastic elasticsearch x-pack *
    elastic elasticsearch x-pack *
    elastic kibana x-pack *
    elastic kibana x-pack *
    elastic logstash x-pack *
    elastic logstash x-pack *
    elastic elasticsearch 6.2.0
    ibm tivoli netcool/impact 7.1.0
    ibm business process manager 8.6
    ibm business automation workflow 18.0.0.0
    ibm business automation workflow 18.0.0.1
    ibm business automation workflow 18.0.0.2
    ibm business automation workflow 19.0.0.1
    ibm business automation workflow 19.0.0.2
    ibm business automation workflow 19.0.0.3
    ibm business automation workflow 20.0.0.1
    ibm business automation workflow 20.0.0.2
    ibm business automation workflow 21.0.2