Vulnerability Description
Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all of the following conditions a-c are true: a) Kibana is configured to use Single-Sign-On as authentication method, one of Kerberos, JWT, Proxy, Client certificate. b) The kibanaserver user is configured to use HTTP Basic as the authentication method. c) Search Guard is configured to use an SSO authentication domain and HTTP Basic at the same time
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Search-Guard | Search Guard | < 5.6.8-7 |
Related Weaknesses (CWE)
References
- https://docs.search-guard.com/6.x-25/changelog-kibana-6.x-12Vendor Advisory
- https://search-guard.com/cve-advisory/Vendor Advisory
- https://docs.search-guard.com/6.x-25/changelog-kibana-6.x-12Vendor Advisory
- https://search-guard.com/cve-advisory/Vendor Advisory
FAQ
What is CVE-2019-13423?
CVE-2019-13423 is a vulnerability with a CVSS score of 8.8 (HIGH). Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all o...
How severe is CVE-2019-13423?
CVE-2019-13423 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13423?
Check the references section above for vendor advisories and patch information. Affected products include: Search-Guard Search Guard.