2025-02-02 03:03:49 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2024-43710",
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-01-23T06:15:27.550",
"lastModified": "2025-01-23T06:15:27.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet."
},
{
"lang": "es",
"value": "Se identific\u00f3 una vulnerabilidad de server side request forgery en Kibana, donde la API /api/fleet/health_check se pod\u00eda usar para enviar solicitudes a endpoints internos. Debido a la naturaleza de la solicitud subyacente, solo se pod\u00eda acceder a losendpoints disponibles a trav\u00e9s de https que devolvieran JSON. Esto lo pueden hacer los usuarios con acceso de lectura a Fleet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521",
"source": "bressers@elastic.co"
}
]
}