Show filters
185 Total Results
Displaying 51-60 of 185
Sort by:
Attacker Value
Unknown

CVE-2023-31422

Disclosure Date: October 26, 2023 (last updated November 04, 2023)
An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, request paths, and other metadata. Some examples of sensitive data which can be included in the logs are account credentials for kibana_system, kibana-metricbeat, or Kibana end-users.
Attacker Value
Unknown

CVE-2023-46667

Disclosure Date: October 26, 2023 (last updated November 04, 2023)
An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server’s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch.
Attacker Value
Unknown

CVE-2023-46668

Disclosure Date: October 26, 2023 (last updated November 07, 2023)
If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
Attacker Value
Unknown

CVE-2023-38387

Disclosure Date: September 03, 2023 (last updated October 08, 2023)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Elastic Email Sender plugin <= 1.2.6 versions.
Attacker Value
Unknown

CVE-2023-31415

Disclosure Date: May 04, 2023 (last updated October 08, 2023)
Kibana version 8.7.0 contains an arbitrary code execution flaw. An attacker with All privileges to the Uptime/Synthetics feature could send a request that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
Attacker Value
Unknown

CVE-2023-31414

Disclosure Date: May 04, 2023 (last updated October 08, 2023)
Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
Attacker Value
Unknown

CVE-2023-31413

Disclosure Date: May 04, 2023 (last updated October 08, 2023)
Filebeat versions through 7.17.9 and 8.6.2 have a flaw in httpjson input that allows the http request Authorization or Proxy-Authorization header contents to be leaked in the logs when debug logging is enabled.
Attacker Value
Unknown

CVE-2022-38779

Disclosure Date: February 22, 2023 (last updated October 08, 2023)
An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL.
Attacker Value
Unknown

CVE-2022-38778

Disclosure Date: February 08, 2023 (last updated October 08, 2023)
A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.
Attacker Value
Unknown

CVE-2022-38777

Disclosure Date: February 08, 2023 (last updated October 08, 2023)
An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.