BIT-logstash-2023-46672

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/logstash/BIT-logstash-2023-46672.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-logstash-2023-46672
Aliases
Published
2024-03-06T10:55:19.003Z
Modified
2025-05-20T10:02:07.006Z
Summary
Logstash Insertion of Sensitive Information into Log File
Details

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances.

The prerequisites for the manifestation of this issue are:

  • Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format.

  • Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.

Database specific
{
    "cpes": [
        "cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:elastic:logstash:7.12.1:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / logstash

Package

Name
logstash
Purl
pkg:bitnami/logstash

Severity

  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
7.12.1
Fixed
7.12.2
Introduced
8.10.0
Fixed
8.11.1