SQL Injection Affecting kibana-8 package, versions <8.16.1-r1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-KIBANA8-8421648
  • published27 Nov 2024
  • disclosed29 Oct 2024

Introduced: 29 Oct 2024

CVE-2024-7042  (opens in a new tab)
CWE-89  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade Chainguard kibana-8 to version 8.16.1-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kibana-8 package and not the kibana-8 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A vulnerability in the GraphCypherQAChain class of langchain-ai/langchainjs versions 0.2.5 and all versions with this class allows for prompt injection, leading to SQL injection. This vulnerability permits unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.

CVSS Scores

version 3.1