Show filters
185 Total Results
Displaying 11-20 of 185
Sort by:
Attacker Value
Unknown

CVE-2024-37285

Disclosure Date: November 14, 2024 (last updated November 15, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv  and Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html  assigned to them. The following Elasticsearch indices permissions are required * write privilege on the system indices .kibana_ingest* * The allow_restricted_indices flag is set to true Any of the following Kibana privileges are additionally required * Under Fleet the All privilege is granted * Under Integration the Read or All privilege is granted * Access to the fleet-setup privilege is gained through the Fleet Server’s service account token
0
Attacker Value
Unknown

CVE-2024-37288

Disclosure Date: September 09, 2024 (last updated September 17, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
Attacker Value
Unknown

CVE-2024-37287

Disclosure Date: August 13, 2024 (last updated August 23, 2024)
A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2024-37283

Disclosure Date: August 12, 2024 (last updated August 13, 2024)
An issue was discovered whereby Elastic Agent will leak secrets from the agent policy elastic-agent.yml only when the log level is configured to debug. By default the log level is set to info, where no leak occurs.
0
Attacker Value
Unknown

CVE-2024-37286

Disclosure Date: August 03, 2024 (last updated September 12, 2024)
APM server logs contain document body from a partially failed bulk index request. For example, in case of unavailable_shards_exception for a specific document, since the ES response line contains the document body, and that APM server logs the ES response line on error, the document is effectively logged.
Attacker Value
Unknown

CVE-2024-23444

Disclosure Date: July 31, 2024 (last updated February 05, 2025)
It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed in the command invocation.
Attacker Value
Unknown

CVE-2024-37281

Disclosure Date: July 30, 2024 (last updated July 31, 2024)
An issue was discovered in Kibana where a user with Viewer role could cause a Kibana instance to crash by sending a large number of maliciously crafted requests to a specific endpoint.
0
Attacker Value
Unknown

CVE-2023-49921

Disclosure Date: July 26, 2024 (last updated September 12, 2024)
An issue was discovered by Elastic whereby Watcher search input logged the search query results on DEBUG log level. This could lead to raw contents of documents stored in Elasticsearch to be printed in logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by removing this excessive logging. This issue only affects users that use Watcher and have a Watch defined that uses the search input and additionally have set the search input’s logger to DEBUG or finer, for example using: org.elasticsearch.xpack.watcher.input.search, org.elasticsearch.xpack.watcher.input, org.elasticsearch.xpack.watcher, or wider, since the loggers are hierarchical.
Attacker Value
Unknown

CVE-2024-37282

Disclosure Date: June 28, 2024 (last updated June 29, 2024)
It was identified that under certain specific preconditions, an API key that was originally created with a specific privileges could be subsequently used to create new API keys that have elevated privileges.
0
Attacker Value
Unknown

CVE-2024-23443

Disclosure Date: June 19, 2024 (last updated August 20, 2024)
A high-privileged user, allowed to create custom osquery packs 17 could affect the availability of Kibana by uploading a maliciously crafted osquery pack.