Show filters
71 Total Results
Displaying 11-20 of 71
Sort by:
Attacker Value
Unknown

CVE-2021-22151

Disclosure Date: November 22, 2023 (last updated December 01, 2023)
It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.
Attacker Value
Unknown

CVE-2021-22150

Disclosure Date: November 22, 2023 (last updated December 02, 2023)
It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana server.
Attacker Value
Unknown

CVE-2021-22142

Disclosure Date: November 22, 2023 (last updated December 02, 2023)
Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to leverage known Chromium vulnerabilities to conduct further attacks. Kibana contains a number of protections to prevent this browser from rendering arbitrary content.
Attacker Value
Unknown

CVE-2023-31422

Disclosure Date: October 26, 2023 (last updated November 04, 2023)
An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, request paths, and other metadata. Some examples of sensitive data which can be included in the logs are account credentials for kibana_system, kibana-metricbeat, or Kibana end-users.
Attacker Value
Unknown

CVE-2023-45807

Disclosure Date: October 16, 2023 (last updated October 21, 2023)
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.
Attacker Value
Unknown

CVE-2023-31415

Disclosure Date: May 04, 2023 (last updated October 08, 2023)
Kibana version 8.7.0 contains an arbitrary code execution flaw. An attacker with All privileges to the Uptime/Synthetics feature could send a request that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
Attacker Value
Unknown

CVE-2023-31414

Disclosure Date: May 04, 2023 (last updated October 08, 2023)
Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
Attacker Value
Unknown

CVE-2022-38779

Disclosure Date: February 22, 2023 (last updated October 08, 2023)
An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL.
Attacker Value
Unknown

CVE-2022-38778

Disclosure Date: February 08, 2023 (last updated October 08, 2023)
A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.
Attacker Value
Unknown

CVE-2021-37936

Disclosure Date: November 18, 2022 (last updated December 22, 2024)
It was discovered that Kibana was not sanitizing document fields containing HTML snippets. Using this vulnerability, an attacker with the ability to write documents to an elasticsearch index could inject HTML. When the Discover app highlighted a search term containing the HTML, it would be rendered for the user.