Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:20934
HistoryJul 31, 2019 - 6:36 a.m.

Cross-Site Request Forgery (CSRF)

2019-07-3106:36:29
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

Kibana is vulnerable to Cross-Site Request Forgery. There is no restriction in graphite.url configuration. Thus, an attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL, possibly leading to an attacker accessing external URL resources as the Kibana process on the host system.

CPENameOperatorVersion
kibanale7.2.0
kibanale6.8.1

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N