We are using Elasticsearch and Kibana 6.x.
In the past, Elasticsearch has serious security issues with scripting. Some exploits allowed an attacker to execute arbitrary remote commands (e.g: https://www.rapid7.com/db/modules/exploit/multi/elasticsearch/search_groovy_script )
Starting from Elasticsearch 6.x:
- Are all the script langages safe when leaving
script.allowed_typesandscript.allowed_contextsto their defaut values? - Is it possible to disable some script langages in Elasticsearch configuration? (e.g. to allow painless only)
Besides, is it safe to expose a Kibana instance to anonymous Internet users if:
- using a security solution like X-Pack
- and allowing anonymous users to access, with read-only rights, to indices with public data only
- and enabling inline scripting