Vulnerability Details : CVE-2016-1000219
Kibana before 4.5.4 and 4.1.11 when a custom output is configured for logging in, cookies and authorization headers could be written to the log files. This information could be used to hijack sessions of other users when using Kibana behind some form of authentication such as Shield.
Vulnerability category: BypassGain privilege
Products affected by CVE-2016-1000219
- cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
- cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1000219
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1000219
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-1000219
-
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1000219
-
http://www.securityfocus.com/bid/99178
Elasticsearch Kibana CVE-2016-1000219 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://www.elastic.co/community/security
Elastic Stack Security Disclosures ยท Report Issues | ElasticVendor Advisory
Jump to