A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
                
            References
                    | Link | Resource | 
|---|---|
| https://discuss.elastic.co/t/apm-java-agent-security-update/289627 | Vendor Advisory | 
| https://discuss.elastic.co/t/apm-java-agent-security-update/289627 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://discuss.elastic.co/t/apm-java-agent-security-update/289627 - Vendor Advisory | 
Information
                Published : 2021-12-08 22:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-37941
Mitre link : CVE-2021-37941
CVE.ORG link : CVE-2021-37941
JSON object : View
Products Affected
                elastic
- apm_agent
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
