CVE-2023-46671

Published: Dic 13, 2023 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2023-50862 Aliases: GSD-2023-46671
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,0
Attack Vector: adjacent_network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

An issue was discovered by Elastic whereby sensitive information may be recorded in Kibana logs in the event of an error. Elastic has released Kibana 8.11.1 which resolves this issue. The error message recorded in the log may contain account credentials for the kibana_system user, API Keys, and credentials of Kibana end-users. The issue occurs infrequently, only if an error is returned from an Elasticsearch cluster, in cases where there is user interaction and an unhealthy cluster (for example, when returning circuit breaker or no shard exceptions).

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0022
Percentile
0,4th
Updated

EPSS Score Trend (Last 90 Days)

532

Insertion of Sensitive Information into Log File

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Kibana by Elastic

Version Range Affected
From 8.0.0 (inclusive)
To 8.11.1 (exclusive)
cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149
https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149