Kibana Insertion of Sensitive Information into Log File
CVE-2023-46671
8HIGH
Summary
An information exposure vulnerability exists in Kibana, allowing sensitive data such as account credentials and API keys to be logged in case of errors during user interactions with an unhealthy Elasticsearch cluster. This issue arises infrequently, specifically during error conditions like circuit breaker or no shard exceptions. Users are advised to upgrade to Kibana version 8.11.1, which mitigates this risk by preventing sensitive information from being recorded in the logs.
Affected Version(s)
Kibana 8.0.0 < 8.11.1
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved