Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-8443

Опубликовано: 30 июн. 2017
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In Kibana X-Pack security versions prior to 5.4.3 if a Kibana user opens a crafted Kibana URL the result could be a redirect to an improperly initialized Kibana login screen. If the user enters credentials on this screen, the credentials will appear in the URL bar. The credentials could then be viewed by untrusted parties or logged into the Kibana access logs.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo) Operational ToolskibanaNot affected
Red Hat OpenShift Enterprise 3kibanaNot affected
Red Hat OpenStack Platform 8 (Liberty) Operational ToolskibanaNot affected
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolskibanaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1533357kibana: Crafted URLs can be used to trick users into disclosing their password

EPSS

Процентиль: 57%
0.00353
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 8 лет назад

In Kibana X-Pack security versions prior to 5.4.3 if a Kibana user opens a crafted Kibana URL the result could be a redirect to an improperly initialized Kibana login screen. If the user enters credentials on this screen, the credentials will appear in the URL bar. The credentials could then be viewed by untrusted parties or logged into the Kibana access logs.

CVSS3: 6.5
github
больше 3 лет назад

In Kibana X-Pack security versions prior to 5.4.3 if a Kibana user opens a crafted Kibana URL the result could be a redirect to an improperly initialized Kibana login screen. If the user enters credentials on this screen, the credentials will appear in the URL bar. The credentials could then be viewed by untrusted parties or logged into the Kibana access logs.

EPSS

Процентиль: 57%
0.00353
Низкий

6.5 Medium

CVSS3