Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23711

Опубликовано: 20 апр. 2022
Источник: redhat
CVSS3: 8.2

Описание

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

A flaw was found in Kibana that could result in an attacker exposing sensitive information related to Elastic Stack monitoring in the Kibana page source, if a user has set the optional monitoring.ui.elasticsearch.* settings. This could result in a loss of confidentiality and integrity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel8-operatorNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Red Hat JBoss Fuse 6KibanaOut of support scope
Red Hat JBoss Fuse Service Works 6KibanaOut of support scope
Red Hat OpenShift Container Platform 3.11kibanaNot affected
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-kibana5Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-elasticsearch-operatorNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-logging-kibana6Not affected
Red Hat OpenStack Platform 13 (Queens)puppet-kibana3Not affected
Red Hat OpenStack Platform 16.1puppet-kibana3Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-200->CWE-497
https://bugzilla.redhat.com/show_bug.cgi?id=2077601kibana: Exposure of Sensitive Information (ESA-2022-05)

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
почти 4 года назад

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 5.3
debian
почти 4 года назад

A vulnerability in Kibana could expose sensitive information related t ...

CVSS3: 5.3
github
почти 4 года назад

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 8.2
fstec
около 4 лет назад

Уязвимость сервиса визуализации данных Kibana связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

8.2 High

CVSS3