Inclusion of Sensitive Information in Log Files in Logstash - CVE-2023-46672

 

Inclusion of Sensitive Information in Log Files in Logstash - CVE-2023-46672

Published: November 16, 2023


Vulnerability identifier: #VU83213
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-46672
CWE-ID: CWE-532
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Logstash
Software vendor:
Elastic Stack

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software may stores sensitive information into log files under certain circumstances. Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration can be logged if Logstash is configured to use the JSON format. A local user can read the log files and gain access to sensitive data.


Remediation

Install updates from vendor's website.

External links