Vulnerability Description
A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credentials for the URL could be inadvertently logged as part of the error message.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | Logstash | < 5.6.15 |
| Netapp | Active Iq Performance Analytics Services | - |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/1690Vendor Advisory
- https://security.netapp.com/advisory/ntap-20190411-0002/Third Party Advisory
- https://www.elastic.co/community/securityVendor Advisory
- https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/1690Vendor Advisory
- https://security.netapp.com/advisory/ntap-20190411-0002/Third Party Advisory
- https://www.elastic.co/community/securityVendor Advisory
FAQ
What is CVE-2019-7612?
CVE-2019-7612 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credenti...
How severe is CVE-2019-7612?
CVE-2019-7612 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-7612?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic Logstash, Netapp Active Iq Performance Analytics Services.