Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Discuss] Workaround for Kibana Reporting Vulnerability ESA-2018-17 (CVE-2018-17245) #25579

Closed
ypid-geberit opened this issue Nov 13, 2018 · 1 comment
Labels
Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@ypid-geberit
Copy link

ypid-geberit commented Nov 13, 2018

I would like to propose a workaround to mitigate CVE-2018-17245 which:

  • Does not require a Kibana (and in turn also Elasticsearch) upgrade.
  • Does not require to disable reporting altogether using xpack.reporting.enabled.

It works by blocking outgoing connections from the Kibana user to the Internet on the server where Kibana is running. Example iptables script:

iptables -F OUTPUT
iptables -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A OUTPUT ! -d 10.0.0.0/8 -m owner --uid-owner kibana -m limit --limit 5/min -j LOG --log-prefix "Kibana security workaround: " --log-level 7
iptables -A OUTPUT ! -d 10.0.0.0/8 -m owner --uid-owner kibana -j REJECT

ip6tables -F OUTPUT
ip6tables -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
ip6tables -A OUTPUT ! -d fd95:9d43:c67b:3d75::/64 -m owner --uid-owner kibana -m limit --limit 5/min -j LOG --log-prefix "Kibana security workaround: " --log-level 7
ip6tables -A OUTPUT ! -d fd95:9d43:c67b:3d75::/64 -m owner --uid-owner kibana -j REJECT

Feel free to give feedback on this. Note that I already posted this in the forum and was redirected here.

Ref: https://www.elastic.co/blog/elastic-support-alert-kibana-reporting-vulnerability
Ref: #24177
Ref: https://discuss.elastic.co/t/workaround-for-kibana-reporting-vulnerability-esa-2018-17-cve-2018-17245/156078

@jen-huang jen-huang added the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Nov 13, 2018
@kobelb
Copy link
Contributor

kobelb commented Jun 19, 2019

Thanks for submitting this workaround @ypid-geberit. I'm closing out this issue as a majority of users have been able to upgrade their Kibana to mitigate the vulnerability so we didn't need to rely on this work-around.

@kobelb kobelb closed this as completed Jun 19, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

3 participants