Vulnerability Description
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | Logstash | >= 8.10.0, < 8.11.1 |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191Release Notes
- https://security.netapp.com/advisory/ntap-20240125-0002/
- https://security.netapp.com/advisory/ntap-20240229-0001/
- https://www.elastic.co/community/securityVendor Advisory
- https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191Release Notes
- https://security.netapp.com/advisory/ntap-20240125-0002/
- https://security.netapp.com/advisory/ntap-20240229-0001/
- https://www.elastic.co/community/securityVendor Advisory
FAQ
What is CVE-2023-46672?
CVE-2023-46672 is a vulnerability with a CVSS score of 8.4 (HIGH). An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash ...
How severe is CVE-2023-46672?
CVE-2023-46672 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46672?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic Logstash.