{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2020-7012","title":"Title"},{"category":"description","text":"Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2020-7012","url":"https://www.suse.com/security/cve/CVE-2020-7012"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1172569 for CVE-2020-7012","url":"https://bugzilla.suse.com/1172569"}],"title":"SUSE CVE CVE-2020-7012","tracking":{"current_release_date":"2025-04-25T05:44:11Z","generator":{"date":"2023-02-15T04:02:02Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2020-7012","initial_release_date":"2023-02-15T04:02:02Z","revision_history":[{"date":"2023-02-15T04:02:02Z","number":"2","summary":"Current version"},{"date":"2025-01-01T05:52:10Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:29:13Z","number":"4","summary":"Current version"},{"date":"2025-02-17T06:50:40Z","number":"5","summary":"Current version"},{"date":"2025-03-15T10:10:39Z","number":"6","summary":"Current version"},{"date":"2025-04-25T05:44:11Z","number":"7","summary":"Current version"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"HPE Helion OpenStack 8","product":{"name":"HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8","product_identification_helper":{"cpe":"cpe:/o:suse:hpe-helion-openstack:8"}}},{"category":"product_name","name":"HPE Helion OpenStack Cloud 8","product":{"name":"HPE Helion OpenStack Cloud 8","product_id":"HPE Helion OpenStack Cloud 8"}},{"category":"product_name","name":"SUSE OpenStack Cloud 7","product":{"name":"SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:7"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 8","product":{"name":"SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 9","product":{"name":"SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud:9"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 9","product":{"name":"SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:9"}}},{"category":"product_version","name":"kibana","product":{"name":"kibana","product_id":"kibana","product_identification_helper":{"cpe":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/kibana@?upstream=kibana.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kibana as component of HPE Helion OpenStack 8","product_id":"HPE Helion OpenStack 8:kibana"},"product_reference":"kibana","relates_to_product_reference":"HPE Helion OpenStack 8"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of HPE Helion OpenStack Cloud 8","product_id":"HPE Helion OpenStack Cloud 8:kibana"},"product_reference":"kibana","relates_to_product_reference":"HPE Helion OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of SUSE OpenStack Cloud 7","product_id":"SUSE OpenStack Cloud 7:kibana"},"product_reference":"kibana","relates_to_product_reference":"SUSE OpenStack Cloud 7"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of SUSE OpenStack Cloud 8","product_id":"SUSE OpenStack Cloud 8:kibana"},"product_reference":"kibana","relates_to_product_reference":"SUSE OpenStack Cloud 8"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of SUSE OpenStack Cloud 9","product_id":"SUSE OpenStack Cloud 9:kibana"},"product_reference":"kibana","relates_to_product_reference":"SUSE OpenStack Cloud 9"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:kibana"},"product_reference":"kibana","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"kibana as component of SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9:kibana"},"product_reference":"kibana","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 9"}]},"vulnerabilities":[{"cve":"CVE-2020-7012","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-7012"}],"notes":[{"category":"general","text":"Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.","title":"CVE description"}],"product_status":{"known_not_affected":["HPE Helion OpenStack 8:kibana","HPE Helion OpenStack Cloud 8:kibana","SUSE OpenStack Cloud 7:kibana","SUSE OpenStack Cloud 8:kibana","SUSE OpenStack Cloud 9:kibana","SUSE OpenStack Cloud Crowbar 8:kibana","SUSE OpenStack Cloud Crowbar 9:kibana"]},"references":[{"category":"external","summary":"CVE-2020-7012","url":"https://www.suse.com/security/cve/CVE-2020-7012"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1172569 for CVE-2020-7012","url":"https://bugzilla.suse.com/1172569"}],"threats":[{"category":"impact","date":"2020-06-03T22:42:12Z","details":"important"}],"title":"CVE-2020-7012"}]}