First published: Wed Nov 22 2023(Updated: )
It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Kibana | >=7.9.0<=7.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-22151.
The title of this vulnerability is 'Kibana path traversal issue'.
The description of this vulnerability is that Kibana does not validate a user supplied path, allowing a malicious user to traverse the Kibana host and load internal files with the .pbf extension.
The Elastic Kibana software versions 7.9.0 to 7.14.0 are affected by this vulnerability.
The severity of this vulnerability is medium with a CVSS score of 4.3.
Yes, you can find references for this vulnerability at the following links: [Reference 1](https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077) and [Reference 2](https://www.elastic.co/community/security).
Yes, the CWE identifier for this vulnerability is CWE-22.