{"vulnerability": "CVE-2024-52972", "sightings": [{"uuid": "821f6435-9a16-46fa-83a0-6e3a4c3de36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgfdjuiqlj2f", "content": "", "creation_timestamp": "2025-01-23T07:15:24.656313Z"}, {"uuid": "01625607-a6f4-4bd5-9828-e921002a1f4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgff62frhh2r", "content": "", "creation_timestamp": "2025-01-23T07:44:35.552708Z"}, {"uuid": "53666d1d-692b-4372-a86e-afcf83ff4e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113877990853818563", "content": "", "creation_timestamp": "2025-01-23T13:50:41.954035Z"}, {"uuid": "8954d361-08cc-4207-987e-2705603dad39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lh5kxwz5e22x", "content": "", "creation_timestamp": "2025-02-01T22:32:28.001092Z"}, {"uuid": "0732bc26-74aa-497c-a6eb-b6bee76a1284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52972\n\ud83d\udd39 Description: An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana.\n\ud83d\udccf Published: 2025-01-23T06:11:10.715Z\n\ud83d\udccf Modified: 2025-01-23T06:11:10.715Z\n\ud83d\udd17 References:\n1. https://discuss.elastic.co/t/kibana-7-17-23-8-15-0-security-updates-esa-2024-32-esa-2024-33/373548", "creation_timestamp": "2025-01-23T07:03:18.000000Z"}, {"uuid": "145adf6e-3959-43c7-90ce-535ff46f37b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52972", "type": "seen", "source": "https://t.me/cvedetector/16165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52972 - Kibana Unchecked Metrics Snapshot Request Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-52972 \nPublished : Jan. 23, 2025, 7:15 a.m. | 41\u00a0minutes ago \nDescription : An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-23T09:07:05.000000Z"}]}