Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-43710

Опубликовано: 23 янв. 2025
Источник: debian
EPSS Низкий

Описание

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kibanaitppackage

EPSS

Процентиль: 25%
0.00088
Низкий

Связанные уязвимости

CVSS3: 4.3
nvd
около 1 года назад

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS3: 4.3
github
около 1 года назад

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

EPSS

Процентиль: 25%
0.00088
Низкий