Elastic

Kibana

83 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 01.05.2025 13:11:14
  • Zuletzt bearbeitet 01.10.2025 19:29:57

Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victim’s browser (XSS) via crafted HTML and JavaScript files. The attacker must have access to the Synthetics app AND/OR have access to write...

  • EPSS 0.03%
  • Veröffentlicht 01.05.2025 13:09:16
  • Zuletzt bearbeitet 02.10.2025 16:34:04

Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation.

  • EPSS 0.26%
  • Veröffentlicht 08.04.2025 20:15:19
  • Zuletzt bearbeitet 02.10.2025 15:27:30

Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal.

  • EPSS 0.06%
  • Veröffentlicht 08.04.2025 16:46:44
  • Zuletzt bearbeitet 30.09.2025 21:36:21

An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them.

  • EPSS 1.28%
  • Veröffentlicht 05.03.2025 10:15:20
  • Zuletzt bearbeitet 02.10.2025 17:53:04

Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 ...

  • EPSS 0.26%
  • Veröffentlicht 23.01.2025 11:15:10
  • Zuletzt bearbeitet 30.09.2025 20:56:18

An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana.

  • EPSS 0.15%
  • Veröffentlicht 23.01.2025 07:15:08
  • Zuletzt bearbeitet 30.09.2025 20:57:56

An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in K...

  • EPSS 0.09%
  • Veröffentlicht 23.01.2025 06:15:27
  • Zuletzt bearbeitet 30.09.2025 20:58:49

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that ret...

  • EPSS 0.16%
  • Veröffentlicht 23.01.2025 06:15:27
  • Zuletzt bearbeitet 30.09.2025 20:59:28

An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and the...

  • EPSS 0.26%
  • Veröffentlicht 21.01.2025 11:15:10
  • Zuletzt bearbeitet 30.09.2025 21:01:56

An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana.