CVE-2023-46672

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*
cpe:2.3:a:elastic:logstash:7.12.1:*:*:*:*:*:*:*

History

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary (en) An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration. (en) An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

21 Nov 2024, 08:29

Type Values Removed Values Added
References () https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 - Release Notes () https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 - Release Notes
References () https://security.netapp.com/advisory/ntap-20240125-0002/ - () https://security.netapp.com/advisory/ntap-20240125-0002/ -
References () https://security.netapp.com/advisory/ntap-20240229-0001/ - () https://security.netapp.com/advisory/ntap-20240229-0001/ -
References () https://www.elastic.co/community/security - Vendor Advisory () https://www.elastic.co/community/security - Vendor Advisory
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 8.4

21 Mar 2024, 02:49

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240229-0001/ -

25 Jan 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240125-0002/ -

22 Nov 2023, 22:38

Type Values Removed Values Added
First Time Elastic logstash
Elastic
CWE CWE-532
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:elastic:logstash:7.12.1:*:*:*:*:*:*:*
cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*
References () https://www.elastic.co/community/security - () https://www.elastic.co/community/security - Vendor Advisory
References () https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 - () https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 - Release Notes

15 Nov 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-15 08:15

Updated : 2025-02-13 18:15


NVD link : CVE-2023-46672

Mitre link : CVE-2023-46672

CVE.ORG link : CVE-2023-46672


JSON object : View

Products Affected

elastic

  • logstash
CWE
CWE-532

Insertion of Sensitive Information into Log File