#VU16833 Information disclosure in Kibana


Published: 2019-01-08

Vulnerability identifier: #VU16833

Vulnerability risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-17245

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Kibana
Web applications / Other software

Vendor: Elastic Stack

Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw when authorization credentials are used for generating PDF reports, Native, or File realms. A remote attacker can obtain potentially sensitive information if a report requests external resources plaintext credentials are included in the HTTP request that can be recovered by an external resource provider.

Mitigation
The vulnerability has been fixed in the versions 6.4.3 and 5.6.13.

Vulnerable software versions

Kibana: 5.0.0 - 5.0.2, 5.1.0 - 5.1.2, 5.2.0 - 5.2.2, 5.3.0 - 5.3.3, 5.4.0 - 5.4.3, 5.5.0 - 5.5.3, 5.6.0 - 5.6.12, 6.4.0 - 6.4.2, 6.3.0 - 6.3.2, 6.2.0 - 6.2.4, 6.1.0 - 6.1.4, 6.0.0 - 6.0.1, 4.6, 4.5, 4.4, 4.3, 4.2, 4.1, 4.0


External links
http://discuss.elastic.co/t/elastic-stack-6-4-3-and-5-6-13-security-update/155594


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability