CVE-2024-43710Server-Side Request Forgery in Kibana

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 56.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 23

Description

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5elastic/kibana8.7.08.15.0
NVDelastic/kibana8.7.08.15.0

Patches

🔴Vulnerability Details

2
CVEList
Kibana server-side request forgery2025-01-23
GHSA
GHSA-5vxg-7wx9-4fp4: A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal2025-01-23
CVE-2024-43710 — Server-Side Request Forgery in Elastic | cvebase