Miggo Logo

CVE-2021-37939: Kibana Sensitive Data Disclosure

2.7

CVSS Score
3.1

Basic Information

EPSS Score
0.38495%
Published
5/24/2022
Updated
7/11/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
kibananpm>= 7.8.0, <= 7.15.17.15.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation in connector implementations when handling HTTP responses. While no patch code is available, the advisory explicitly names JIRA/Resilient connectors as vectors. In Kibana's architecture, connector execution handlers (execute()) would be responsible for processing external service responses. These functions would appear in runtime profiles when malicious connectors are triggered to exfiltrate data. Confidence is medium due to inference from vulnerability description rather than direct patch analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It w*s *is*ov*r** t**t Ki**n*’s JIR* *onn**tor & I*M R*sili*nt *onn**tor *oul* ** us** to r*turn *TTP r*spons* **t* on int*rn*l *osts, w*i** m*y ** int*ntion*lly *i***n *rom pu*li* vi*w. Usin* t*is vuln*r**ility, * m*li*ious us*r wit* t** **ility to

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt v*li**tion in *onn**tor impl*m*nt*tions w**n **n*lin* *TTP r*spons*s. W*il* no p*t** *o** is *v*il**l*, t** **visory *xpli*itly n*m*s JIR*/R*sili*nt *onn**tors *s v**tors. In Ki**n*'s *r**it**tur*, *onn**tor