vulnerability
Arch Linux: Arbitrary code execution (CVE-2019-7609)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Mar 25, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Mar 25, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-7609
- https://attackerkb.com/topics/CVE-2019-7609
- URL-http://packetstormsecurity.com/files/174569/Kibana-Timelion-Prototype-Pollution-Remote-Code-Execution.html
- URL-https://access.redhat.com/errata/RHBA-2019:2824
- URL-https://access.redhat.com/errata/RHSA-2019:2860
- URL-https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
- URL-https://security.archlinux.org/ASA-201902-26
- URL-https://www.elastic.co/community/security
- CWE-94
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.