An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances.
The prerequisites for the manifestation of this issue are:
* Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format.
* Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
References
Configurations
Configuration 1 (hide)
|
History
21 Mar 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Nov 2023, 22:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:* cpe:2.3:a:elastic:logstash:7.12.1:*:*:*:*:*:*:* |
|
First Time |
Elastic logstash
Elastic |
|
CWE | CWE-532 | |
References | () https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 - Release Notes | |
References | () https://www.elastic.co/community/security - Vendor Advisory |
15 Nov 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-15 08:15
Updated : 2024-03-21 02:49
NVD link : CVE-2023-46672
Mitre link : CVE-2023-46672
CVE.ORG link : CVE-2023-46672
JSON object : View
Products Affected
elastic
- logstash
CWE
CWE-532
Insertion of Sensitive Information into Log File