First published: Thu Jun 13 2024(Updated: )
A flaw was discovered in Kibana, allowing view-only users of alerting to use the run_soon API making the alerting rule run continuously, potentially affecting the system availability if the alerting rule is running complex queries.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic | >=8.6.3<8.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37279 is rated as a medium severity vulnerability due to its potential impact on system availability.
To fix CVE-2024-37279, upgrade Kibana to a version later than 8.14.0 or apply any available patches provided by Elastic.
Users of Elastic Kibana versions between 8.6.3 and 8.14.0, specifically those with view-only access to alerting, are affected by CVE-2024-37279.
CVE-2024-37279 allows view-only users to misuse the run_soon API, potentially causing alert rules to execute continuously.
The potential consequences of CVE-2024-37279 include degraded system performance and disruption of availability due to the execution of complex queries.