Show filters
71 Total Results
Displaying 41-50 of 71
Sort by:
Attacker Value
Unknown

CVE-2019-7618

Disclosure Date: October 01, 2019 (last updated November 27, 2024)
A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user.
Attacker Value
Unknown

CVE-2019-13423

Disclosure Date: August 23, 2019 (last updated November 27, 2024)
Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all of the following conditions a-c are true: a) Kibana is configured to use Single-Sign-On as authentication method, one of Kerberos, JWT, Proxy, Client certificate. b) The kibanaserver user is configured to use HTTP Basic as the authentication method. c) Search Guard is configured to use an SSO authentication domain and HTTP Basic at the same time
Attacker Value
Unknown

CVE-2019-13422

Disclosure Date: August 23, 2019 (last updated November 27, 2024)
Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an attacker can redirect the user to a potentially malicious site upon Kibana login.
0
Attacker Value
Unknown

CVE-2019-7616

Disclosure Date: July 30, 2019 (last updated November 27, 2024)
Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SSRF) flaw in the graphite integration for Timelion visualizer. An attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL. This could possibly lead to an attacker accessing external URL resources as the Kibana process on the host system.
Attacker Value
Unknown

CVE-2018-20698

Disclosure Date: April 09, 2019 (last updated November 27, 2024)
The floragunn Search Guard plugin before 6.x-16 for Kibana allows URL injection for login redirects on the login page when basePath is set.
0
Attacker Value
Unknown

CVE-2019-7610

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
0
Attacker Value
Unknown

CVE-2019-7608

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
Kibana versions before 5.6.15 and 6.6.1 had a cross-site scripting (XSS) vulnerability that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
0
Attacker Value
Unknown

CVE-2018-17245

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an error in the way authorization credentials are used when generating PDF reports. If a report requests external resources plaintext credentials are included in the HTTP request that could be recovered by an external resource provider.
0
Attacker Value
Unknown

CVE-2018-17246

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
0
Attacker Value
Unknown

CVE-2018-3830

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
Kibana versions 5.3.0 to 6.4.1 had a cross-site scripting (XSS) vulnerability via the source field formatter that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.