Lucene search

K

Logstash Security Vulnerabilities

cve
cve

CVE-2014-4326

Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

7.5AI Score

0.005EPSS

2014-07-22 02:55 PM
23
cve
cve

CVE-2015-4152

Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.

6.7AI Score

0.003EPSS

2015-06-15 03:59 PM
24
cve
cve

CVE-2015-5378

Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server.

7.5CVSS

7.3AI Score

0.003EPSS

2017-06-27 08:29 PM
23
cve
cve

CVE-2015-5619

Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack.

5.9CVSS

5.4AI Score

0.002EPSS

2017-08-09 04:29 PM
21
cve
cve

CVE-2016-1000221

Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information.

7.5CVSS

7.4AI Score

0.001EPSS

2017-06-16 09:29 PM
24
cve
cve

CVE-2016-1000222

Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will create malicious formulas in the CSV data.

7.5CVSS

7.4AI Score

0.001EPSS

2017-06-16 09:29 PM
22
cve
cve

CVE-2016-10363

Logstash versions prior to 2.3.3, when using the Netflow Codec plugin, a remote attacker crafting malicious Netflow v5, Netflow v9 or IPFIX packets could perform a denial of service attack on the Logstash instance. The errors resulting from these crafted inputs are not handled by the codec and can ...

7.5CVSS

7.5AI Score

0.002EPSS

2017-06-16 09:29 PM
20
cve
cve

CVE-2017-14730

The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link.

7.8CVSS

7.6AI Score

0.0004EPSS

2017-09-25 05:29 PM
24
cve
cve

CVE-2018-3817

When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.

6.5CVSS

6.4AI Score

0.001EPSS

2018-03-30 08:29 PM
65
cve
cve

CVE-2019-7612

A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credentials for the URL could be inadvertently logged as part of the error message.

9.8CVSS

9.1AI Score

0.008EPSS

2019-03-25 07:29 PM
118
cve
cve

CVE-2019-7620

Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.

7.5CVSS

7.2AI Score

0.003EPSS

2019-10-30 02:15 PM
43
cve
cve

CVE-2020-2143

Jenkins Logstash Plugin 2.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

5.3CVSS

5.3AI Score

0.001EPSS

2020-03-09 04:15 PM
50
cve
cve

CVE-2021-22138

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in th...

3.7CVSS

4AI Score

0.001EPSS

2021-05-13 06:15 PM
39
5
cve
cve

CVE-2023-46672

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-comma...

8.4CVSS

5.2AI Score

0.0004EPSS

2023-11-15 08:15 AM
37