Information Exposure Affecting kibana Open this link in a new tab package, versions <5.4.3


0.0
medium
  • Attack Complexity

    Low

  • User Interaction

    Required

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    npm:kibana:20170628

  • published

    4 Jan 2018

  • disclosed

    28 Jun 2017

  • credit

    Unknown

How to fix?

Upgrade kibana to version 5.4.3 or higher.

Overview

Kibana is an open source, browser-based analytics and search dashboard for Elasticsearch.

Affected versions of this package are vulnerable to Information Exposure.

In Kibana X-Pack security versions prior to 5.4.3 if a Kibana user opens a crafted Kibana URL the result could be a redirect to an improperly initialized Kibana login screen. If the user enters credentials on this screen, the credentials will appear in the URL bar. The credentials could then be viewed by untrusted parties or logged into the Kibana access logs.