Описание
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances.
The prerequisites for the manifestation of this issue are:
-
Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format.
-
Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
Ссылки
- Release Notes
- Vendor Advisory
- Release Notes
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
8.4 High
CVSS3
5.5 Medium
CVSS3
Дефекты
Связанные уязвимости
An issue was identified by Elastic whereby sensitive information is re ...
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
Уязвимость конвейера обработки данных на стороне сервера Elastic Logstash, связанная с раскрытием информации через регистрационные файлы, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
8.4 High
CVSS3
5.5 Medium
CVSS3