{ "id": "CVE-2023-31422", "sourceIdentifier": "bressers@elastic.co", "published": "2023-10-26T02:15:08.340", "lastModified": "2024-11-21T08:01:49.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, request paths, and other metadata. Some examples of sensitive data which can be included in the logs are account credentials for kibana_system, kibana-metricbeat, or Kibana end-users." }, { "lang": "es", "value": "Elastic descubri\u00f3 un problema por el cual se registra informaci\u00f3n confidencial en los registros de Kibana en caso de error. El problema afecta solo a la versi\u00f3n 8.10.0 de Kibana cuando se inicia sesi\u00f3n en el dise\u00f1o JSON o cuando el dise\u00f1o del patr\u00f3n est\u00e1 configurado para registrar el patr\u00f3n %meta. Elastic lanz\u00f3 Kibana 8.10.1 que resuelve este problema. El objeto de error registrado en el log contiene informaci\u00f3n de solicitud, que puede incluir datos confidenciales, como credenciales de autenticaci\u00f3n, cookies, encabezados de autorizaci\u00f3n, par\u00e1metros de consulta, rutas de solicitud y otros metadatos. Algunos ejemplos de datos confidenciales que se pueden incluir en los registros son las credenciales de cuenta para los usuarios finales de kibana_system, kibana-metricbeat o Kibana." } ], "metrics": { "cvssMetricV31": [ { "source": "bressers@elastic.co", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.0, "baseSeverity": "CRITICAL", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.3, "impactScore": 6.0 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "bressers@elastic.co", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-532" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-532" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:elastic:kibana:8.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0246F05-44E2-41F1-8D36-A63914DA1862" } ] } ] } ], "references": [ { "url": "https://discuss.elastic.co/t/kibana-8-10-1-security-update/343287", "source": "bressers@elastic.co", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.elastic.co/community/security", "source": "bressers@elastic.co", "tags": [ "Vendor Advisory" ] }, { "url": "https://discuss.elastic.co/t/kibana-8-10-1-security-update/343287", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.elastic.co/community/security", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }