Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-17245

Опубликовано: 06 нояб. 2018
Источник: redhat
CVSS3: 7.5

Описание

Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an error in the way authorization credentials are used when generating PDF reports. If a report requests external resources plaintext credentials are included in the HTTP request that could be recovered by an external resource provider.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10kibanaNot affected
Red Hat OpenShift Container Platform 3.11kibanaNot affected
Red Hat OpenShift Container Platform 3.2kibanaNot affected
Red Hat OpenShift Container Platform 3.3kibanaNot affected
Red Hat OpenShift Container Platform 3.4kibanaNot affected
Red Hat OpenShift Container Platform 3.5kibanaNot affected
Red Hat OpenShift Container Platform 3.6kibanaNot affected
Red Hat OpenShift Container Platform 3.7kibanaNot affected
Red Hat OpenShift Container Platform 3.9kibanaNot affected
Red Hat OpenShift Enterprise 3.0kibanaNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-201
https://bugzilla.redhat.com/show_bug.cgi?id=1647346kibana: Information leak in the PDF generation process

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 7 лет назад

Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an error in the way authorization credentials are used when generating PDF reports. If a report requests external resources plaintext credentials are included in the HTTP request that could be recovered by an external resource provider.

CVSS3: 9.8
debian
около 7 лет назад

Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an ...

CVSS3: 9.8
github
больше 3 лет назад

Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an error in the way authorization credentials are used when generating PDF reports. If a report requests external resources plaintext credentials are included in the HTTP request that could be recovered by an external resource provider.

7.5 High

CVSS3