8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances.
The prerequisites for the manifestation of this issue are:
Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format.
Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
CPE | Name | Operator | Version |
---|---|---|---|
elastic:logstash | elastic logstash | lt | 8.11.1 |
elastic:logstash | elastic logstash | eq | 7.12.1 |
[
{
"defaultStatus": "unaffected",
"product": "Logstash",
"vendor": "Elastic",
"versions": [
{
"lessThan": "8.11.1",
"status": "affected",
"version": "8.10.0",
"versionType": "semver"
}
]
}
]
8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.5%