Show filters
185 Total Results
Displaying 41-50 of 185
Sort by:
Attacker Value
Unknown

CVE-2021-22151

Disclosure Date: November 22, 2023 (last updated December 01, 2023)
It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.
Attacker Value
Unknown

CVE-2021-22150

Disclosure Date: November 22, 2023 (last updated December 02, 2023)
It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana server.
Attacker Value
Unknown

CVE-2021-22142

Disclosure Date: November 22, 2023 (last updated December 02, 2023)
Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to leverage known Chromium vulnerabilities to conduct further attacks. Kibana contains a number of protections to prevent this browser from rendering arbitrary content.
Attacker Value
Unknown

CVE-2023-46672

Disclosure Date: November 15, 2023 (last updated February 14, 2025)
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
Attacker Value
Unknown

CVE-2023-31416

Disclosure Date: October 26, 2023 (last updated July 26, 2024)
Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment.
Attacker Value
Unknown

CVE-2023-31419

Disclosure Date: October 26, 2023 (last updated February 14, 2025)
A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.
Attacker Value
Unknown

CVE-2023-31418

Disclosure Date: October 26, 2023 (last updated November 07, 2023)
An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and we have no indication that the issue is known or that it is being exploited in the wild.
Attacker Value
Unknown

CVE-2023-31417

Disclosure Date: October 26, 2023 (last updated February 14, 2025)
Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw is that sensitive information such as passwords and tokens might be printed in cleartext in Elasticsearch audit logs. Note that audit logging is disabled by default and needs to be explicitly enabled and even when audit logging is enabled, request bodies that could contain sensitive information are not printed to the audit log unless explicitly configured.
Attacker Value
Unknown

CVE-2023-46666

Disclosure Date: October 26, 2023 (last updated November 08, 2023)
An issue was discovered when using Document Level Security and the SPO "Limited Access" functionality in Elastic Sharepoint Online Python Connector. If a user is assigned limited access permissions to an item on a Sharepoint site then that user would have read permissions to all content on the Sharepoint site through Elasticsearch.
Attacker Value
Unknown

CVE-2023-31421

Disclosure Date: October 26, 2023 (last updated February 16, 2024)
It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.