Show filters
74 Total Results
Displaying 1-10 of 74
Sort by:
Attacker Value
Unknown
CVE-2019-7609
Disclosure Date: March 25, 2019 (last updated July 25, 2024)
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
1
Attacker Value
Unknown
CVE-2024-43708
Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana.
0
Attacker Value
Unknown
CVE-2024-52972
Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana.
0
Attacker Value
Unknown
CVE-2024-43710
Disclosure Date: January 23, 2025 (last updated January 23, 2025)
A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
0
Attacker Value
Unknown
CVE-2024-43707
Disclosure Date: January 23, 2025 (last updated January 23, 2025)
An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions.
0
Attacker Value
Unknown
CVE-2024-52973
Disclosure Date: January 21, 2025 (last updated January 21, 2025)
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana.
0
Attacker Value
Unknown
CVE-2024-37285
Disclosure Date: November 14, 2024 (last updated November 15, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv and Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html assigned to them.
The following Elasticsearch indices permissions are required
* write privilege on the system indices .kibana_ingest*
* The allow_restricted_indices flag is set to true
Any of the following Kibana privileges are additionally required
* Under Fleet the All privilege is granted
* Under Integration the Read or All privilege is granted
* Access to the fleet-setup privilege is gained through the Fleet Server’s service account token
0
Attacker Value
Unknown
CVE-2024-37288
Disclosure Date: September 09, 2024 (last updated September 17, 2024)
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html .
0
Attacker Value
Unknown
CVE-2024-37287
Disclosure Date: August 13, 2024 (last updated August 23, 2024)
A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2024-37281
Disclosure Date: July 30, 2024 (last updated July 31, 2024)
An issue was discovered in Kibana where a user with Viewer role could cause a Kibana instance to crash by sending a large number of maliciously crafted requests to a specific endpoint.
0