It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923 | Release Notes Vendor Advisory |
https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923 | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923 - Release Notes, Vendor Advisory |
Information
Published : 2021-11-18 16:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-37938
Mitre link : CVE-2021-37938
CVE.ORG link : CVE-2021-37938
JSON object : View
Products Affected
elastic
- kibana