First published: Thu Apr 21 2022(Updated: )
A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Kibana | >=7.2.1<7.17.3 | |
Elastic Kibana | >=8.0.0<8.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Kibana vulnerability is CVE-2022-23711.
The severity level of CVE-2022-23711 is medium.
Kibana versions between 7.2.1 and 7.17.3, as well as versions between 8.0.0 and 8.1.3 are affected by CVE-2022-23711.
CVE-2022-23711 can be exploited by an attacker who gains access to the Kibana page source, thus exposing sensitive information related to Elastic Stack monitoring.
Yes, a security update is available for CVE-2022-23711. It is recommended to update to Kibana versions 7.17.3 or 8.1.3 to mitigate the vulnerability.