Elastic

Logstash

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 06.05.2025 17:29:07
  • Zuletzt bearbeitet 07.05.2025 14:13:20

Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.

  • EPSS 0.15%
  • Veröffentlicht 15.11.2023 08:15:07
  • Zuletzt bearbeitet 13.02.2025 18:15:36

An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.el...

  • EPSS 0.11%
  • Veröffentlicht 13.05.2021 18:15:09
  • Zuletzt bearbeitet 21.11.2024 05:49:34

In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the mo...

  • EPSS 1.41%
  • Veröffentlicht 30.10.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:48:25

Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would...

  • EPSS 0.48%
  • Veröffentlicht 25.03.2019 19:29:02
  • Zuletzt bearbeitet 21.11.2024 04:48:24

A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credentials for the URL could be inadvertently logged as p...

  • EPSS 0.31%
  • Veröffentlicht 30.03.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:06:05

When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.

  • EPSS 0.31%
  • Veröffentlicht 09.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle a...

  • EPSS 0.98%
  • Veröffentlicht 27.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server.

  • EPSS 0.75%
  • Veröffentlicht 16.06.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information.

  • EPSS 0.35%
  • Veröffentlicht 16.06.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will create malicious formulas in the CSV data.