Filtered by vendor Elasticsearch
Subscribe
Total
16 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-7017 | 2 Elasticsearch, Oracle | 4 Kibana, Communications Billing And Revenue Management, Communications Cloud Native Core Network Function Cloud Native Environment and 1 more | 2022-10-07 | 4.6 MEDIUM | 6.7 MEDIUM |
In Kibana versions before 6.8.11 and 7.8.1 the region map visualization in contains a stored XSS flaw. An attacker who is able to edit or create a region map visualization could obtain sensitive information or perform destructive actions on behalf of Kibana users who view the region map visualization. | |||||
CVE-2020-7016 | 1 Elasticsearch | 1 Kibana | 2021-07-20 | 2.1 LOW | 4.8 MEDIUM |
Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive. | |||||
CVE-2017-11479 | 2 Elastic, Elasticsearch | 2 Kibana, Kibana | 2020-08-14 | 4.3 MEDIUM | 6.1 MEDIUM |
Kibana versions prior to 5.6.1 had a cross-site scripting (XSS) vulnerability in Timelion that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | |||||
CVE-2017-8446 | 1 Elasticsearch | 2 X-pack, X-pack Reporting | 2019-10-09 | 4.0 MEDIUM | 5.3 MEDIUM |
The Reporting feature in X-Pack in versions prior to 5.5.2 and standalone Reporting plugin versions versions prior to 2.4.6 had an impersonation vulnerability. A user with the reporting_user role could execute a report with the permissions of another reporting user, possibly gaining access to sensitive data. | |||||
CVE-2017-8444 | 1 Elasticsearch | 1 Cloud Enterprise | 2019-10-09 | 4.3 MEDIUM | 5.9 MEDIUM |
The client-forwarder in Elastic Cloud Enterprise versions prior to 1.0.2 do not properly encrypt traffic to ZooKeeper. If an attacker is able to man in the middle (MITM) the traffic between the client-forwarder and ZooKeeper they could potentially obtain sensitive data. | |||||
CVE-2017-11480 | 1 Elasticsearch | 1 Packetbeat | 2019-10-09 | 5.0 MEDIUM | 7.5 HIGH |
Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic. | |||||
CVE-2016-10362 | 1 Elasticsearch | 1 Output Plugin | 2019-10-09 | 4.0 MEDIUM | 6.5 MEDIUM |
Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials. | |||||
CVE-2017-14730 | 2 Elasticsearch, Gentoo | 2 Logstash, Linux | 2019-10-02 | 7.2 HIGH | 7.8 HIGH |
The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link. | |||||
CVE-2015-5619 | 2 Elastic, Elasticsearch | 2 Logstash, Logstash | 2019-06-17 | 4.3 MEDIUM | 5.9 MEDIUM |
Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack. | |||||
CVE-2015-5378 | 2 Elastic, Elasticsearch | 2 Logstash, Logstash | 2019-06-17 | 5.0 MEDIUM | 7.5 HIGH |
Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server. | |||||
CVE-2015-4165 | 1 Elasticsearch | 1 Elasticsearch | 2018-10-09 | 6.0 MEDIUM | 7.5 HIGH |
The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code. | |||||
CVE-2015-5531 | 1 Elasticsearch | 1 Elasticsearch | 2018-10-09 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. | |||||
CVE-2015-1427 | 1 Elasticsearch | 1 Elasticsearch | 2018-10-09 | 7.5 HIGH | N/A |
The Groovy scripting engine in Elasticsearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script. | |||||
CVE-2014-6439 | 1 Elasticsearch | 1 Elasticsearch | 2018-10-09 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the CORS functionality in Elasticsearch before 1.4.0.Beta1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2014-3120 | 1 Elasticsearch | 1 Elasticsearch | 2016-12-06 | 6.8 MEDIUM | N/A |
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine. | |||||
CVE-2015-3337 | 1 Elasticsearch | 1 Elasticsearch | 2015-06-25 | 4.3 MEDIUM | N/A |
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors. |