Ensure spawning of child processes are not susceptible to prototype pollution #49605
Labels
Feature:Hardening
Harding of Kibana from a security perspective
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
While there's currently no known prototype pollution gadget in Kibana, if one is found, it might be possible to perform RCE via the child processes being spawned.
Therefore, it's prudent that we harden this attack vector before someone finds a way to utilize it.
We can mitigate this our selves inside of Kibana by ensuring that the arguments passed to the
spawn
function (and friends) are properly sanitized, eg:Preferably we should also fix this in Node.js core, so it's harder to fall victim to this sort of attack. I've created a PR to deal with this in Node.js core: nodejs/node#30008
See also the related Node.js core PR to harden
process.env
in general: nodejs/node#30063The text was updated successfully, but these errors were encountered: