Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-7616

Опубликовано: 31 июл. 2019
Источник: redhat
CVSS3: 3.4
EPSS Низкий

Описание

Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SSRF) flaw in the graphite integration for Timelion visualizer. An attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL. This could possibly lead to an attacker accessing external URL resources as the Kibana process on the host system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10kibanaFix deferred
Red Hat OpenShift Container Platform 3.11kibanaFix deferred
Red Hat OpenShift Container Platform 3.4kibanaOut of support scope
Red Hat OpenShift Container Platform 3.5kibanaOut of support scope
Red Hat OpenShift Container Platform 3.6kibanaOut of support scope
Red Hat OpenShift Container Platform 3.7kibanaOut of support scope
Red Hat OpenShift Container Platform 3.9kibanaFix deferred
Red Hat OpenShift Container Platform 4kibanaFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1747243kibana: Server side request forgery in the graphite integration for Timelion visualizer

EPSS

Процентиль: 92%
0.09087
Низкий

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 4.9
nvd
больше 6 лет назад

Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SSRF) flaw in the graphite integration for Timelion visualizer. An attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL. This could possibly lead to an attacker accessing external URL resources as the Kibana process on the host system.

CVSS3: 4.9
debian
больше 6 лет назад

Kibana versions before 6.8.2 and 7.2.1 contain a server side request f ...

CVSS3: 4.9
github
больше 3 лет назад

Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SSRF) flaw in the graphite integration for Timelion visualizer. An attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL. This could possibly lead to an attacker accessing external URL resources as the Kibana process on the host system.

EPSS

Процентиль: 92%
0.09087
Низкий

3.4 Low

CVSS3