// For flags

CVE-2023-46671

Kibana Insertion of Sensitive Information into Log File

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered by Elastic whereby sensitive information may be recorded in Kibana logs in the event of an error. Elastic has released Kibana 8.11.1 which resolves this issue. The error message recorded in the log may contain account credentials for the kibana_system user, API Keys, and credentials of Kibana end-users. The issue occurs infrequently, only if an error is returned from an Elasticsearch cluster, in cases where there is user interaction and an unhealthy cluster (for example, when returning circuit breaker or no shard exceptions).

Elastic descubrió un problema por el cual se puede registrar información confidencial en los registros de Kibana en caso de un error. Elastic lanzó Kibana 8.11.1 que resuelve este problema. El mensaje de error registrado en el registro puede contener credenciales de cuenta para el usuario de kibana_system, claves API y credenciales de los usuarios finales de Kibana. El problema ocurre con poca frecuencia, solo si se devuelve un error desde un clúster de Elasticsearch, en los casos en que hay interacción del usuario y un clúster en mal estado (por ejemplo, cuando se devuelve un disyuntor o no hay excepciones de fragmentos).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-24 CVE Reserved
  • 2023-12-13 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-11-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-532: Insertion of Sensitive Information into Log File
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elastic
Search vendor "Elastic"
Kibana
Search vendor "Elastic" for product "Kibana"
>= 8.0.0 < 8.11.1
Search vendor "Elastic" for product "Kibana" and version " >= 8.0.0 < 8.11.1"
-
Affected