It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.
                
            References
                    | Link | Resource | 
|---|---|
| https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 | Vendor Advisory | 
| https://www.elastic.co/community/security | Vendor Advisory | 
| https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 | Vendor Advisory | 
| https://www.elastic.co/community/security | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:49
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 3.1 | 
| References | () https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 - Vendor Advisory | |
| References | () https://www.elastic.co/community/security - Vendor Advisory | 
30 Nov 2023, 18:14
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
| CWE | CWE-22 | |
| References | () https://www.elastic.co/community/security - Vendor Advisory | |
| References | () https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 - Vendor Advisory | |
| First Time | Elastic kibana Elastic | |
| CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | 
22 Nov 2023, 03:36
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-22 01:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-22151
Mitre link : CVE-2021-22151
CVE.ORG link : CVE-2021-22151
JSON object : View
Products Affected
                elastic
- kibana
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
