CVE-2024-43710

A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

History

30 Sep 2025, 20:58

Type Values Removed Values Added
CPE cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Summary
  • (es) Se identificó una vulnerabilidad de server side request forgery en Kibana, donde la API /api/fleet/health_check se podía usar para enviar solicitudes a endpoints internos. Debido a la naturaleza de la solicitud subyacente, solo se podía acceder a losendpoints disponibles a través de https que devolvieran JSON. Esto lo pueden hacer los usuarios con acceso de lectura a Fleet.
First Time Elastic
Elastic kibana
References () https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 - () https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 - Patch, Issue Tracking, Vendor Advisory

23 Jan 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-23 06:15

Updated : 2025-09-30 20:58


NVD link : CVE-2024-43710

Mitre link : CVE-2024-43710

CVE.ORG link : CVE-2024-43710


JSON object : View

Products Affected

elastic

  • kibana
CWE
CWE-918

Server-Side Request Forgery (SSRF)