Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-26940

Опубликовано: 19 мар. 2026
Источник: redhat
CVSS3: 6.5

Описание

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value.

A flaw was found in the Timelion visualization plugin in Kibana. An authenticated user can exploit this by sending a specially crafted Timelion expression. This expression overwrites internal series data properties with an excessively large quantity value. This improper validation of input quantity can lead to a Denial of Service (DoS) by causing excessive memory allocation, making the service unavailable.

Отчет

This is a MODERATE impact denial of service flaw in the Kibana Timelion visualization plugin. An authenticated user can exploit this by sending a specially crafted Timelion expression, leading to excessive memory allocation and service unavailability. This vulnerability requires an authenticated user to trigger the flaw.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/cluster-logging-rhel9-operatorFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Fix deferred
Red Hat JBoss Enterprise Application Platform 8kibanaFix deferred
Red Hat JBoss Enterprise Application Platform Expansion PackkibanaFix deferred
Red Hat OpenShift distributed tracing 3rhosdt/tempo-jaeger-query-rhel9Fix deferred
Red Hat OpenStack Platform 16.2puppet-kibana3Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1284
https://bugzilla.redhat.com/show_bug.cgi?id=2449139Kibana: Timelion: Kibana Timelion Plugin: Denial of Service via improper input validation in Timelion expressions

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
13 дней назад

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value.

CVSS3: 6.5
debian
13 дней назад

Improper Validation of Specified Quantity in Input (CWE-1284) in the T ...

CVSS3: 6.5
github
13 дней назад

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value.

6.5 Medium

CVSS3