A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 | Patch Issue Tracking Vendor Advisory |
Configurations
History
30 Sep 2025, 20:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Elastic
Elastic kibana |
|
References | () https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 - Patch, Issue Tracking, Vendor Advisory |
23 Jan 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-23 06:15
Updated : 2025-09-30 20:58
NVD link : CVE-2024-43710
Mitre link : CVE-2024-43710
CVE.ORG link : CVE-2024-43710
JSON object : View
Products Affected
elastic
- kibana
CWE
CWE-918
Server-Side Request Forgery (SSRF)