SB2023121332 - Inclusion of sensitive information in log files in Elastic Beats



SB2023121332 - Inclusion of sensitive information in log files in Elastic Beats

Published: December 13, 2023

Security Bulletin ID SB2023121332
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-49922)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. Beats and Elastic Agent would log a raw event in its own logs at the `WARN` or `ERROR` level if ingesting that event to Elasticsearch failed with any `4xx HTTP` status code except `409` or `429`. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Beats or Elastic Agent logs. A local user can read the log files and gain access to sensitive data.


2) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-6687)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. Beats and Elastic Agent would log a raw event in its own logs at the `WARN` or `ERROR` level if ingesting that event to Elasticsearch failed with any `4xx HTTP` status code except `409` or `429`. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Beats or Elastic Agent logs. A local user can read the log files and gain access to sensitive data.


Remediation

Install update from vendor's website.