First published: Thu May 13 2021(Updated: )
In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Kibana | <6.8.15 | |
Elastic Kibana | >=7.0.0<7.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22136 is a vulnerability in Kibana versions before 7.12.0 and 6.8.15 that allows background polling activities to extend authenticated users' sessions, bypassing the session timeout.
CVE-2021-22136 affects Kibana versions before 7.12.0 and 6.8.15 by not respecting the session timeout, allowing user sessions to be extended unintentionally.
CVE-2021-22136 has a severity rating of 3.5 (low).
To fix CVE-2021-22136, upgrade your Kibana installation to version 7.12.0 or 6.8.15.
You can find more information about CVE-2021-22136 at the following link: [Click here](https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125).