Vulnerability Name: | CVE-2019-7612 (CCN-159333) | ||||||||||||
Assigned: | 2019-03-25 | ||||||||||||
Published: | 2019-03-25 | ||||||||||||
Updated: | 2020-10-05 | ||||||||||||
Summary: | A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credentials for the URL could be inadvertently logged as part of the error message. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-532 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-7612 Source: CCN Type: Elastic Web site Elastic Stack 6.6.1 and 5.6.15 security update Source: MISC Type: Vendor Advisory https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 Source: XF Type: UNKNOWN elastic-logstash-cve20197612-info-disc(159333) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190411-0002/ Source: MISC Type: Vendor Advisory https://www.elastic.co/community/security Source: CCN Type: IBM Security Bulletin 1170562 (API Connect) IBM API Connect is impacted by a vulnerability in Elastic Logstash (CVE-2019-7612) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |