what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Kevin Kluge

Email addresskevin at elastic.co
First Active2015-06-10
Last Active2015-11-19
Kibana Cross Site Request Forgery
Posted Nov 19, 2015
Authored by Kevin Kluge

Kibana versions prior to 4.1.3 and 4.2.1 suffer from a cross site request forgery vulnerability.

tags | advisory, csrf
advisories | CVE-2015-8131
SHA-256 | 6045ea2c042b81972ed4a68e93347e2b9910ce5897698ea762510910c470cac1
Logstash 1.5.2 SSL/TLS FREAK
Posted Jul 21, 2015
Authored by Kevin Kluge, Accenture Security Team

Logstash 1.5.2 and prior versions are vulnerable to a SSL/TLS security issue called the FREAK attack. If you are using the Lumberjack input, FREAK allows an attacker to successfully implement a man in the middle attack, intercepting communication between the Logstash Forwarder agent and Logstash server.

tags | advisory
advisories | CVE-2015-5378
SHA-256 | b7135fa3ae882e982da1c97f18565f7476767f2800a6c0cc71e186e95bad5b18
Elasticsearch Directory Traversal
Posted Jul 17, 2015
Authored by Kevin Kluge

Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory traversal attack that allows an attacker to retrieve files that are readable by the Elasticsearch JVM process.

tags | advisory, file inclusion
advisories | CVE-2015-5531
SHA-256 | b31e33f0be2db96a5fdb079e65aaf1b8bd17143da9e03e617b58e897d6aa2937
Elasticsearch Remote Code Execution
Posted Jul 17, 2015
Authored by Kevin Kluge

Elasticsearch versions prior to 1.6.1 are vulnerable to an engineered attack on its transport protocol that enables remote code execution.

tags | advisory, remote, code execution, protocol
advisories | CVE-2015-5377
SHA-256 | c7d03a23059a26c14cfa85c4a73e1ef9e80899f3676ade54bb247e68d5444f6b
Elasticsearch 1.5.2 File Creation
Posted Jun 10, 2015
Authored by Kevin Kluge

Elasticsearch versions 1.0.0 through 1.5.2 are vulnerable to an engineered attack on other applications on the system. The snapshot API may be used indirectly to place snapshot metadata files into locations that are writeable by the user running the Elasticsearch process. It is possible to create a file that another application could read and take action on, such as code execution.

tags | advisory, code execution
advisories | CVE-2015-4165
SHA-256 | 40fbbad63203d51d9594c5a223b36155c3bc025496d567a1cd717891d12e5525
Logstash 1.4.2 Directory Traversal
Posted Jun 10, 2015
Authored by Kevin Kluge

Logstash versions 1.4.2 and prior are vulnerable to a directory traversal attack that allows an attacker to overwrite files on the server running Logstash.

tags | advisory, file inclusion
advisories | CVE-2015-4152
SHA-256 | 15f05c723e1b04d767214a61d1c74ca2c6761f51c75c29b5564d9ff5525fe92f
Kibana 4.0.2 Cross Site Scripting
Posted Jun 10, 2015
Authored by Kevin Kluge

Kibana versions 4.0.0, 4.0.1, and 4.0.2 suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2015-4093
SHA-256 | 49c7e5c94dc36f2240b1ab23d6ffcbb9873f9a1280b585195865fccb340cad36
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close