It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 | Vendor Advisory |
https://www.elastic.co/community/security | Vendor Advisory |
Configurations
History
30 Nov 2023, 18:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 - Vendor Advisory | |
References | () https://www.elastic.co/community/security - Vendor Advisory | |
First Time |
Elastic kibana
Elastic |
|
CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
22 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-22 01:15
Updated : 2024-02-28 20:54
NVD link : CVE-2021-22151
Mitre link : CVE-2021-22151
CVE.ORG link : CVE-2021-22151
JSON object : View
Products Affected
elastic
- kibana
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')