First published: Thu Jan 23 2025(Updated: )
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-52972 is considered high due to its potential to cause a crash in Kibana.
To fix CVE-2024-52972, update Kibana to the latest version that addresses this vulnerability.
Users with read access to the Observability Metrics or Logs features in Kibana are affected by CVE-2024-52972.
An attacker can exploit CVE-2024-52972 by sending specially crafted requests to /api/metrics/snapshot to cause Kibana to crash.
CVE-2024-52972 affects all versions of Kibana prior to the security updates that address this vulnerability.