
CVE-2024-23446 – Kibana Broken Access Control issue
https://notcve.org/view.php?id=CVE-2024-23446
07 Feb 2024 — An issue was discovered by Elastic, whereby the Detection Engine Search API does not respect Document-level security (DLS) or Field-level security (FLS) when querying the .alerts-security.alerts-{space_id} indices. Users who are authorized to call this API may obtain unauthorized access to documents if their roles are configured with DLS or FLS against the aforementioned index. Elastic descubrió un problema por el cual la API de búsqueda del motor de detección no respeta la seguridad a nivel de documento (D... • https://discuss.elastic.co/t/kibana-8-12-1-security-update-esa-2024-01/352686 • CWE-284: Improper Access Control •

CVE-2023-46675 – Kibana Insertion of Sensitive Information into Log File
https://notcve.org/view.php?id=CVE-2023-46675
13 Dec 2023 — An issue was discovered by Elastic whereby sensitive information may be recorded in Kibana logs in the event of an error or in the event where debug level logging is enabled in Kibana. Elastic has released Kibana 8.11.2 which resolves this issue. The messages recorded in the log may contain Account credentials for the kibana_system user, API Keys, and credentials of Kibana end-users, Elastic Security package policy objects which can contain private keys, bearer token, and sessions of 3rd-party integrations ... • https://discuss.elastic.co/t/kibana-8-11-2-7-17-16-security-update-esa-2023-27/349182/2 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2023-46671 – Kibana Insertion of Sensitive Information into Log File
https://notcve.org/view.php?id=CVE-2023-46671
13 Dec 2023 — An issue was discovered by Elastic whereby sensitive information may be recorded in Kibana logs in the event of an error. Elastic has released Kibana 8.11.1 which resolves this issue. The error message recorded in the log may contain account credentials for the kibana_system user, API Keys, and credentials of Kibana end-users. The issue occurs infrequently, only if an error is returned from an Elasticsearch cluster, in cases where there is user interaction and an unhealthy cluster (for example, when returni... • https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2023-31422 – Kibana Insertion of Sensitive Information into Log File
https://notcve.org/view.php?id=CVE-2023-31422
26 Oct 2023 — An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, reque... • https://discuss.elastic.co/t/kibana-8-10-1-security-update/343287 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2023-31414
https://notcve.org/view.php?id=CVE-2023-31414
04 May 2023 — Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process. • https://discuss.elastic.co/t/kibana-8-7-1-security-updates/332330 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-31415
https://notcve.org/view.php?id=CVE-2023-31415
04 May 2023 — Kibana version 8.7.0 contains an arbitrary code execution flaw. An attacker with All privileges to the Uptime/Synthetics feature could send a request that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process. • https://discuss.elastic.co/t/kibana-8-7-1-security-updates/332330 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-38779
https://notcve.org/view.php?id=CVE-2022-38779
21 Feb 2023 — An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL. • https://discuss.elastic.co/t/kibana-7-17-9-and-8-6-2-security-update/325782 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2022-38778
https://notcve.org/view.php?id=CVE-2022-38778
08 Feb 2023 — A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process. • https://discuss.elastic.co/t/elastic-7-17-9-8-5-0-and-8-6-1-security-update/324661 • CWE-20: Improper Input Validation •

CVE-2022-23713
https://notcve.org/view.php?id=CVE-2022-23713
06 Jul 2022 — A cross-site-scripting (XSS) vulnerability was discovered in the Vega Charts Kibana integration which could allow arbitrary JavaScript to be executed in a victim’s browser. Se ha detectado una vulnerabilidad de tipo cross-site-scripting (XSS) en la integración de Vega Charts Kibana, que podría permitir la ejecución de JavaScript arbitrario en el navegador de la víctima • https://discuss.elastic.co/t/elastic-8-3-1-8-3-0-and-7-17-5-security-update/308613 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-23711
https://notcve.org/view.php?id=CVE-2022-23711
21 Apr 2022 — A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a r... • https://discuss.elastic.co/t/kibana-7-17-3-and-8-1-3-security-update/302826 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •