Логотип exploitDog
bind:CVE-2024-43710
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-43710

Количество 3

Количество 3

nvd логотип

CVE-2024-43710

около 1 года назад

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2024-43710

около 1 года назад

A server side request forgery vulnerability was identified in Kibana w ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-5vxg-7wx9-4fp4

около 1 года назад

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-43710

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS3: 4.3
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-43710

A server side request forgery vulnerability was identified in Kibana w ...

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-5vxg-7wx9-4fp4

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS3: 4.3
0%
Низкий
около 1 года назад

Уязвимостей на страницу