Skip to content

APM Server vulnerable to Insertion of Sensitive Information into Log File

Moderate severity GitHub Reviewed Published Feb 8, 2024 to the GitHub Advisory Database • Updated Aug 7, 2024

Package

gomod github.com/elastic/apm-server (Go)

Affected versions

< 8.12.1

Patched versions

8.12.1

Description

An issue was discovered whereby APM Server could log at ERROR level, a response from Elasticsearch indicating that indexing the document failed and that response would contain parts of the original document. Depending on the nature of the document that the APM Server attempted to ingest, this could lead to the insertion of sensitive or private information in the APM Server logs.

References

Published by the National Vulnerability Database Feb 7, 2024
Published to the GitHub Advisory Database Feb 8, 2024
Reviewed Feb 16, 2024
Last updated Aug 7, 2024

Severity

Moderate

EPSS score

0.087%
(38th percentile)

Weaknesses

CVE ID

CVE-2024-23448

GHSA ID

GHSA-8r33-q5j5-rh7g

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.