First published: Fri Jun 16 2017(Updated: )
Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/logstash-core | <5.0.1 | 5.0.1 |
Logstash Output Plugin for Elasticsearch | <=5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10362 is categorized as a moderate severity vulnerability due to the exposure of sensitive HTTP basic auth credentials.
To fix CVE-2016-10362, upgrade Logstash to version 5.0.1 or later.
CVE-2016-10362 exposes HTTP basic authentication credentials to log files when updating connections.
CVE-2016-10362 affects all versions prior to Logstash 5.0.1.
The impact of CVE-2016-10362 includes potential leakage of sensitive authentication information through log files.