Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pfm6-x9q4-rphr

Опубликовано: 19 нояб. 2021
Источник: github
Github: Не прошло ревью

Описание

It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.

It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.

EPSS

Процентиль: 38%
0.00169
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.3
nvd
около 4 лет назад

It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.

CVSS3: 4.3
debian
около 4 лет назад

It was discovered that on Windows operating systems specifically, Kiba ...

EPSS

Процентиль: 38%
0.00169
Низкий

Дефекты

CWE-22