{"vulnerability": "CVE-2024-37288", "sightings": [{"uuid": "5409b10a-0f3c-4a15-a665-9396a6a9849e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/CyberBulletin/591", "content": "\u26a1\ufe0fCritical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2024-09-09T07:57:07.000000Z"}, {"uuid": "8bdf8cbe-6088-490b-9973-7c6ec77e0841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/cvedetector/5101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37288 - Elastic Kibana YAML Deserialization Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37288 \nPublished : Sept. 9, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use  Elastic Security\u2019s built-in AI tools  \u00a0and have configured an  Amazon Bedrock connector  . \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-09T12:18:24.000000Z"}, {"uuid": "862361fa-f395-47fa-a4fc-b88b2354e637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/CyberBulletin/597", "content": "Critical Kibana Flaws Expose Systems to Arbitrary Code Execution\n\nURGENT: Critical security advisory for #Kibana users. Update to version 8.15.1 now to mitigate vulnerabilities CVE-2024-37288 (CVSS 9.9) and CVE-2024-37285 (CVSS 9.1). \n\n#CyberBulletin", "creation_timestamp": "2024-09-09T09:59:46.000000Z"}, {"uuid": "03f3a910-7f55-43ca-b429-993c6ad27fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12529", "content": "\u200aCritical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution\n\nhttps://securityonline.info/critical-kibana-flaws-cve-2024-37288-cve-2024-37285-expose-systems-to-arbitrary-code-execution/", "creation_timestamp": "2024-09-09T09:27:41.000000Z"}, {"uuid": "e08ea248-833c-4170-b40b-c740978b01a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/InfoSecInsider/23714", "content": "\u26a1\ufe0fCritical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2024-09-09T10:00:11.000000Z"}, {"uuid": "7fff03dc-5eb3-4198-9bf9-ec8795920f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/InfoSecInsider/23720", "content": "Critical Kibana Flaws Expose Systems to Arbitrary Code Execution\n\nURGENT: Critical security advisory for #Kibana users. Update to version 8.15.1 now to mitigate vulnerabilities CVE-2024-37288 (CVSS 9.9) and CVE-2024-37285 (CVSS 9.1). \n\n#CyberBulletin", "creation_timestamp": "2024-09-09T10:00:15.000000Z"}, {"uuid": "196e7127-a4df-4882-a9cc-595537a929b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/InfoSecInsider/239", "content": "Critical Kibana Flaws Expose Systems to Arbitrary Code Execution\n\nURGENT: Critical security advisory for #Kibana users. Update to version 8.15.1 now to mitigate vulnerabilities CVE-2024-37288 (CVSS 9.9) and CVE-2024-37285 (CVSS 9.1). \n\n#CyberBulletin", "creation_timestamp": "2024-09-09T10:00:16.000000Z"}, {"uuid": "90029552-6bff-4792-acd5-6e3bcdb08741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37288", "type": "seen", "source": "https://t.me/InfoSecInsider/233", "content": "\u26a1\ufe0fCritical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2024-09-09T10:00:16.000000Z"}]}