Show filters
74 Total Results
Displaying 1-10 of 74
Sort by:
Attacker Value
Unknown

CVE-2019-7609

Disclosure Date: March 25, 2019 (last updated July 25, 2024)
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Attacker Value
Unknown

CVE-2024-43708

Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana.
0
Attacker Value
Unknown

CVE-2024-52972

Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana.
0
Attacker Value
Unknown

CVE-2024-43710

Disclosure Date: January 23, 2025 (last updated January 23, 2025)
A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
0
Attacker Value
Unknown

CVE-2024-43707

Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions.
0
Attacker Value
Unknown

CVE-2024-52973

Disclosure Date: January 21, 2025 (last updated January 21, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana.
0
Attacker Value
Unknown

CVE-2024-37285

Disclosure Date: November 14, 2024 (last updated November 15, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv  and Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html  assigned to them. The following Elasticsearch indices permissions are required * write privilege on the system indices .kibana_ingest* * The allow_restricted_indices flag is set to true Any of the following Kibana privileges are additionally required * Under Fleet the All privilege is granted * Under Integration the Read or All privilege is granted * Access to the fleet-setup privilege is gained through the Fleet Server’s service account token
0
Attacker Value
Unknown

CVE-2024-37288

Disclosure Date: September 09, 2024 (last updated September 17, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html  and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
Attacker Value
Unknown

CVE-2024-37287

Disclosure Date: August 13, 2024 (last updated August 23, 2024)
A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2024-37281

Disclosure Date: July 30, 2024 (last updated July 31, 2024)
An issue was discovered in Kibana where a user with Viewer role could cause a Kibana instance to crash by sending a large number of maliciously crafted requests to a specific endpoint.
0