In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Kibana | Elastic | * | 6.8.15 (excluding) | 
| Kibana | Elastic | 7.0.0 (including) | 7.12.0 (excluding) |