A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 23 Jan 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet. | |
Title | Kibana server-side request forgery | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: elastic
Published: 2025-01-23T06:06:38.572Z
Updated: 2025-01-23T14:48:53.139Z
Reserved: 2024-08-15T09:26:41.511Z
Link: CVE-2024-43710

Updated: 2025-01-23T14:48:47.691Z

Status : Received
Published: 2025-01-23T06:15:27.550
Modified: 2025-01-23T06:15:27.550
Link: CVE-2024-43710

No data.