Show filters
185 Total Results
Displaying 71-80 of 185
Sort by:
Attacker Value
Unknown

CVE-2022-23710

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.
Attacker Value
Unknown

CVE-2022-23709

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw was discovered in Kibana in which users with Read access to the Uptime feature could modify alerting rules. A user with this privilege would be able to create new alerting rules or overwrite existing ones. However, any new or modified rules would not be enabled, and a user with this privilege could not modify alerting connectors. This effectively means that Read users could disable existing alerting rules.
Attacker Value
Unknown

CVE-2022-23708

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index.
Attacker Value
Unknown

CVE-2022-23707

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
An XSS vulnerability was found in Kibana index patterns. Using this vulnerability, an authenticated user with permissions to create index patterns can inject malicious javascript into the index pattern which could execute against other users
Attacker Value
Unknown

CVE-2021-37941

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
Attacker Value
Unknown

CVE-2021-37940

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
An information disclosure via GET request server-side request forgery vulnerability was discovered with the Workplace Search Github Enterprise Server integration. Using this vulnerability, a malicious Workplace Search admin could use the GHES integration to view hosts that might not be publicly accessible.
Attacker Value
Unknown

CVE-2021-37939

Disclosure Date: November 18, 2021 (last updated February 23, 2025)
It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster.
Attacker Value
Unknown

CVE-2021-37938

Disclosure Date: November 18, 2021 (last updated February 23, 2025)
It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.
Attacker Value
Unknown

CVE-2021-22147

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
Attacker Value
Unknown

CVE-2021-22149

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization via an alternate route. Using this vulnerability, an authenticated attacker could utilize API keys belonging to higher privileged users.