CVE-2024-23448 – github.com/elastic/apm-server
Package
Manager: go
Name: github.com/elastic/apm-server
Vulnerable Version: >=0 <8.12.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00317 pctl0.54222
Details
APM Server vulnerable to Insertion of Sensitive Information into Log File An issue was discovered whereby APM Server could log at ERROR level, a response from Elasticsearch indicating that indexing the document failed and that response would contain parts of the original document. Depending on the nature of the document that the APM Server attempted to ingest, this could lead to the insertion of sensitive or private information in the APM Server logs.
Metadata
Created: 2024-02-08T00:32:19Z
Modified: 2024-11-18T16:26:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-8r33-q5j5-rh7g/GHSA-8r33-q5j5-rh7g.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-8r33-q5j5-rh7g
Finding: F091
Auto approve: 1