An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions.
History

Thu, 23 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Jan 2025 06:30:00 +0000

Type Values Removed Values Added
Title Kibana server-side request forgery Kibana exposure of sensitive information to an unauthorized actor

Thu, 23 Jan 2025 06:15:00 +0000

Type Values Removed Values Added
Description An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions.
Title Kibana server-side request forgery
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published: 2025-01-23T06:08:10.724Z

Updated: 2025-01-23T14:47:46.730Z

Reserved: 2024-08-15T09:26:41.511Z

Link: CVE-2024-43707

cve-icon Vulnrichment

Updated: 2025-01-23T14:47:42.695Z

cve-icon NVD

Status : Received

Published: 2025-01-23T06:15:27.380

Modified: 2025-01-23T06:15:27.380

Link: CVE-2024-43707

cve-icon Redhat

No data.