Логотип exploitDog
bind:CVE-2023-46672
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-46672

Количество 4

Количество 4

nvd логотип

CVE-2023-46672

около 2 лет назад

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

CVSS3: 8.4
EPSS: Низкий
debian логотип

CVE-2023-46672

около 2 лет назад

An issue was identified by Elastic whereby sensitive information is re ...

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-r6fg-prgw-3ff5

около 2 лет назад

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2023-08201

около 2 лет назад

Уязвимость конвейера обработки данных на стороне сервера Elastic Logstash, связанная с раскрытием информации через регистрационные файлы, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-46672

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

CVSS3: 8.4
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-46672

An issue was identified by Elastic whereby sensitive information is re ...

CVSS3: 8.4
0%
Низкий
около 2 лет назад
github логотип
GHSA-r6fg-prgw-3ff5

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

CVSS3: 8.4
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-08201

Уязвимость конвейера обработки данных на стороне сервера Elastic Logstash, связанная с раскрытием информации через регистрационные файлы, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.4
0%
Низкий
около 2 лет назад

Уязвимостей на страницу