First published: Tue Jul 30 2019(Updated: )
A TLS certificate validation flaw was found in Elastic APM agent for Ruby versions before 2.9.0. When specifying a trusted server CA certificate via the 'server_ca_cert' setting, the Ruby agent would not properly verify the certificate returned by the APM server. This could result in a man in the middle style attack against the Ruby agent.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic APM Agent (Ruby) | <2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7615 is classified as a medium severity vulnerability due to its potential for exploitation in a man-in-the-middle attack.
To fix CVE-2019-7615, upgrade the Elastic APM agent for Ruby to version 2.9.0 or later.
CVE-2019-7615 affects all versions of the Elastic APM agent for Ruby prior to 2.9.0.
If exploited, CVE-2019-7615 can allow an attacker to perform man-in-the-middle attacks by bypassing TLS certificate validation.
Yes, CVE-2019-7615 specifically affects the Elastic APM agent for Ruby.