Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36561 | A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html . |
Tue, 17 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
ssvc
|
Tue, 17 Sep 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:kibana:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Mon, 16 Sep 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic kibana |
|
| CPEs | cpe:2.3:a:elastic:kibana:8.15.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Elastic
Elastic kibana |
Mon, 09 Sep 2024 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html . | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-09-17T13:04:21.866Z
Reserved: 2024-06-05T14:21:14.942Z
Link: CVE-2024-37288
Updated: 2024-09-09T13:07:37.106Z
Status : Analyzed
Published: 2024-09-09T09:15:02.183
Modified: 2024-09-16T13:29:06.023
Link: CVE-2024-37288
No data.
OpenCVE Enrichment
No data.
EUVD