logo

CVE-2024-23448 github.com/elastic/apm-server

Package

Manager: go
Name: github.com/elastic/apm-server
Vulnerable Version: >=0 <8.12.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00317 pctl0.54222

Details

APM Server vulnerable to Insertion of Sensitive Information into Log File An issue was discovered whereby APM Server could log at ERROR level, a response from Elasticsearch indicating that indexing the document failed and that response would contain parts of the original document. Depending on the nature of the document that the APM Server attempted to ingest, this could lead to the insertion of sensitive or private information in the APM Server logs.

Metadata

Created: 2024-02-08T00:32:19Z
Modified: 2024-11-18T16:26:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-8r33-q5j5-rh7g/GHSA-8r33-q5j5-rh7g.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-8r33-q5j5-rh7g
Finding: F091
Auto approve: 1