A vulnerability in Kibana could expose sensitive information related to Elastic Stack monitoring in the Kibana page source. Elastic Stack monitoring features provide a way to keep a pulse on the health and performance of your Elasticsearch cluster. Authentication with a vulnerable Kibana instance is not required to view the exposed information. The Elastic Stack monitoring exposure only impacts users that have set any of the optional monitoring.ui.elasticsearch.* settings in order to configure Kibana as a remote UI for Elastic Stack Monitoring. The same vulnerability in Kibana could expose other non-sensitive application-internal information in the page source.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-03T03:51:45.563Z
Reserved: 2022-01-19T00:00:00
Link: CVE-2022-23711

No data.

Status : Modified
Published: 2022-04-21T19:15:08.947
Modified: 2024-11-21T06:49:09.447
Link: CVE-2022-23711
