A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
History

Thu, 23 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Jan 2025 06:15:00 +0000

Type Values Removed Values Added
Description A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
Title Kibana server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published: 2025-01-23T06:06:38.572Z

Updated: 2025-01-23T14:48:53.139Z

Reserved: 2024-08-15T09:26:41.511Z

Link: CVE-2024-43710

cve-icon Vulnrichment

Updated: 2025-01-23T14:48:47.691Z

cve-icon NVD

Status : Received

Published: 2025-01-23T06:15:27.550

Modified: 2025-01-23T06:15:27.550

Link: CVE-2024-43710

cve-icon Redhat

No data.