#VU50604 Inclusion of Sensitive Information in Log Files in Elasticsearch


Published: 2021-02-11 | Updated: 2021-02-11

Vulnerability identifier: #VU50604

Vulnerability risk: Low

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7021

CWE-ID: CWE-532

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Elasticsearch
Web applications / Other software

Vendor: Elastic Stack

Description

The vulnerability allows a remote administrator to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files, when audit logging and the emit_request_body option is enabled. The Elasticsearch administrator can view the audit log and obtain password hashes or authentication tokens in clear text.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Elasticsearch: 7.9.0 - 7.9.3, 7.8.0 - 7.8.1, 7.7.0 - 7.7.1, 7.6.0 - 7.6.2, 7.5.0 - 7.5.2, 7.4.0 - 7.4.2, 6.8.0 - 6.8.13, 6.7.0 - 6.7.2, 6.5.0 - 6.5.4, 6.4.0 - 6.4.3, 6.3.0 - 6.3.2, 6.2.0 - 6.2.4, 6.1.0 - 6.1.4, 6.0.0 - 6.0.1, 6.6.0 - 6.6.2, 7.3.0 - 7.3.2, 7.2.0 - 7.2.1, 7.0.0 - 7.0.1, 7.1.0 - 7.1.1


External links
http://discuss.elastic.co/t/elastic-stack-7-11-0-and-6-8-14-security-update/263915
http://www.elastic.co/guide/en/elasticsearch/reference/6.8/release-notes-6.8.14.html#release-notes-6.8.14
http://www.elastic.co/community/security#ESA-2021-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability