{"vulnerability": "CVE-2024-43710", "sightings": [{"uuid": "f2785c28-6a22-4a82-9d60-b30f510329c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43710", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgfbspd4b52u", "content": "", "creation_timestamp": "2025-01-23T06:44:33.962375Z"}, {"uuid": "4434ec93-d816-4de9-b9bd-8be1e61a441f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43710", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgfa7kiicz27", "content": "", "creation_timestamp": "2025-01-23T06:15:57.147135Z"}, {"uuid": "503a8e4b-48f1-4d8b-8e92-ce5273c32500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43710", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113872848727322418", "content": "", "creation_timestamp": "2025-01-22T16:02:59.299998Z"}, {"uuid": "157dba9a-e276-4dfa-bbb5-f04428ed6fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43710", "type": "seen", "source": "https://t.me/cvedetector/16163", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43710 - Kibana SSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43710 \nPublished : Jan. 23, 2025, 6:15 a.m. | 38\u00a0minutes ago \nDescription : A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T08:17:01.000000Z"}, {"uuid": "b5697653-c609-47ee-a51e-623dd4e62760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43710", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2738", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43710\n\ud83d\udd39 Description: A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.\n\ud83d\udccf Published: 2025-01-23T06:06:38.572Z\n\ud83d\udccf Modified: 2025-01-23T14:48:53.139Z\n\ud83d\udd17 References:\n1. https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521", "creation_timestamp": "2025-01-23T15:02:58.000000Z"}]}