CVE-2019-13423
Summary
| CVE | CVE-2019-13423 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-08-23 14:15:00 UTC |
| Updated | 2020-10-08 12:58:00 UTC |
| Description | Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all of the following conditions a-c are true: a) Kibana is configured to use Single-Sign-On as authentication method, one of Kerberos, JWT, Proxy, Client certificate. b) The kibanaserver user is configured to use HTTP Basic as the authentication method. c) Search Guard is configured to use an SSO authentication domain and HTTP Basic at the same time |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Search-guard | Search Guard | All | All | All | All |
| Application | Search-guard | Search Guard | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Kibana 6.x-12 | Elasticsearch Security | Search Guard | CONFIRM | docs.search-guard.com | Vendor Advisory |
| CVE - advisory - Search Guard | MISC | search-guard.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.