CVE-2024-37279

4.3 MEDIUM

📋 TL;DR

This vulnerability allows view-only users in Kibana to abuse the run_soon API to trigger continuous execution of alerting rules. This could lead to resource exhaustion and system availability issues if rules run complex queries. Organizations using Kibana with alerting features and view-only user accounts are affected.

💻 Affected Systems

Products:
  • Kibana
Versions: Versions before 8.14.0
Operating Systems: All platforms running Kibana
Default Config Vulnerable: ⚠️ Yes
Notes: Requires alerting feature to be enabled and view-only users with access to alerting functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service through resource exhaustion, potentially crashing Kibana instances or degrading Elasticsearch performance due to continuous execution of complex alert queries.

🟠

Likely Case

Degraded system performance, increased resource consumption, and potential alert fatigue from repeated rule executions.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect abnormal rule execution patterns.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but view-only users could exploit if exposed externally.
🏢 Internal Only: MEDIUM - Internal users with view-only permissions could intentionally or accidentally trigger resource exhaustion.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple API call abuse with existing credentials.

Exploitation requires view-only user credentials and knowledge of the run_soon API endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kibana 8.14.0

Vendor Advisory: https://discuss.elastic.co/t/kibana-8-14-0-security-update-esa-2024-15/360887

Restart Required: Yes

Instructions:

1. Backup Kibana configuration and data. 2. Download Kibana 8.14.0 or later from Elastic website. 3. Stop Kibana service. 4. Install/upgrade to patched version. 5. Restart Kibana service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict view-only user permissions

all

Remove or restrict view-only user access to alerting features and APIs.

kibana.yml: xpack.alerting.rules.minimumScheduleInterval.value: 1m
kibana.yml: xpack.alerting.rules.minimumScheduleInterval.unit: 'seconds'

Implement API rate limiting

all

Configure rate limiting for alerting APIs to prevent abuse.

Configure through Kibana security settings or reverse proxy

🧯 If You Can't Patch

  • Implement strict role-based access control to limit view-only users' permissions
  • Monitor alert execution logs for abnormal patterns and implement alerting on excessive rule runs

🔍 How to Verify

Check if Vulnerable:

Check Kibana version: if version < 8.14.0 and alerting is enabled, system is vulnerable.

Check Version:

curl -X GET 'http://localhost:5601/api/status' | grep number

Verify Fix Applied:

Verify Kibana version is 8.14.0 or later and test that view-only users cannot trigger continuous rule execution.

📡 Detection & Monitoring

Log Indicators:

  • Excessive 'run_soon' API calls from view-only users
  • Unusually frequent alert rule executions
  • High resource usage patterns in Kibana logs

Network Indicators:

  • Repeated POST requests to /api/alerting/rule/*/_run_soon endpoint
  • Increased network traffic to Kibana alerting APIs

SIEM Query:

source="kibana.log" AND ("run_soon" OR "alerting/rule") | stats count by user, rule_id | where count > threshold

🔗 References

📤 Share & Export