Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-0543

Опубликовано: 13 янв. 2026
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.

A flaw was found in Kibana's Email Connector. An authenticated attacker with view-level privileges can exploit this vulnerability by providing a specially crafted email address parameter. This improper input validation can lead to an excessive allocation of resources, resulting in a complete denial of service (DoS) for all users until the service is manually restarted.

Отчет

This vulnerability is rated Moderate for Red Hat products as it allows an authenticated attacker with view-level privileges to trigger a denial of service in Kibana's Email Connector. By providing a specially crafted email address, the attacker can cause excessive resource allocation, leading to service unavailability until a manual restart. This impact is limited to deployments where the Email Connector is enabled and accessible to authenticated users.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/cluster-logging-rhel9-operatorFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Fix deferred
Red Hat JBoss Enterprise Application Platform 8kibanaFix deferred
Red Hat JBoss Enterprise Application Platform Expansion PackkibanaFix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-jaeger-query-rhel8Fix deferred
Red Hat OpenStack Platform 16.2puppet-kibana3Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2429394Kibana: Kibana: Denial of Service due to improper input validation in Email Connector

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
3 месяца назад

Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.

CVSS3: 6.5
debian
3 месяца назад

Improper Input Validation (CWE-20) in Kibana's Email Connector can all ...

CVSS3: 6.5
github
3 месяца назад

Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3