A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-28648 A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2024-08-03T03:51:45.563Z

Reserved: 2022-01-19T00:00:00

Link: CVE-2022-23711

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-21T19:15:08.947

Modified: 2024-11-21T06:49:09.447

Link: CVE-2022-23711

cve-icon Redhat

Severity : Important

Publid Date: 2022-04-20T00:00:00Z

Links: CVE-2022-23711 - Bugzilla

cve-icon OpenCVE Enrichment

No data.