#VU53728 Information exposure through an error message in Elastic APM .NET Agent


Published: 2021-06-02

Vulnerability identifier: #VU53728

Vulnerability risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-22143

CWE-ID: CWE-209

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Elastic APM .NET Agent
Universal components / Libraries / Software for developers

Vendor: Elastic Stack

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to Elastic APM .NET Agent leaks sensitive HTTP header information when logging the details during an application error. A remote attacker can intercept traffic sent to the APM server and gain access to potentially sensitive information, sent via HTTP headers.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Elastic APM .NET Agent: 0.0.1.0 - 1.9.0


External links
http://www.elastic.co/community/security#ESA-2021-14


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability