Server-side Request Forgery (SSRF) Affecting kibana package, versions >=8.7.0 <8.15.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-KIBANA-8660198
  • published23 Jan 2025
  • disclosed23 Jan 2025
  • creditUnknown

Introduced: 23 Jan 2025

NewCVE-2024-43710  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade kibana to version 8.15.0 or higher.

Overview

kibana is an open source (Apache Licensed), browser-based analytics and search dashboard for Elasticsearch.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the /api/fleet/health_check API. An attacker can send requests to internal endpoints by exploiting the nature of the underlying request, which only allows access to endpoints over HTTPS that return JSON. This is only exploitable if the attacker has read access to Fleet.

CVSS Scores

version 4.0
version 3.1