Логотип exploitDog
bind:CVE-2022-23711
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23711

Количество 5

Количество 5

redhat логотип

CVE-2022-23711

почти 4 года назад

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2022-23711

почти 4 года назад

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2022-23711

почти 4 года назад

A vulnerability in Kibana could expose sensitive information related t ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-83v8-h997-4xf4

почти 4 года назад

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-02725

около 4 лет назад

Уязвимость сервиса визуализации данных Kibana связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2022-23711

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 8.2
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-23711

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
debian логотип
CVE-2022-23711

A vulnerability in Kibana could expose sensitive information related t ...

CVSS3: 5.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-83v8-h997-4xf4

A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-02725

Уязвимость сервиса визуализации данных Kibana связанная с раскрытием информации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.2
0%
Низкий
около 4 лет назад

Уязвимостей на страницу