Vulnerabilities > Elastic > Logstash > Medium

DATE CVE VULNERABILITY TITLE RISK
2023-11-15 CVE-2023-46672 Information Exposure Through Log Files vulnerability in Elastic Logstash 7.12.1/8.10.0
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration.
local
low complexity
elastic CWE-532
5.5
2018-03-30 CVE-2018-3817 Information Exposure vulnerability in Elastic Logstash
When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.
network
low complexity
elastic CWE-200
6.5
2017-08-09 CVE-2015-5619 Improper Certificate Validation vulnerability in multiple products
Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack.
network
high complexity
elasticsearch elastic CWE-295
5.9