First published: Wed Feb 07 2024(Updated: )
An issue was discovered whereby APM Server could log at ERROR level, a response from Elasticsearch indicating that indexing the document failed and that response would contain parts of the original document. Depending on the nature of the document that the APM Server attempted to ingest, this could lead to the insertion of sensitive or private information in the APM Server logs.
Credit: bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/elastic/apm-server | <8.12.1 | 8.12.1 |
Elastic | <8.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23448 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2024-23448, upgrade the APM Server to version 8.12.1 or later.
The risks associated with CVE-2024-23448 include the inadvertent logging of sensitive document data in error messages.
CVE-2024-23448 affects all versions of APM Server prior to 8.12.1.
CVE-2024-23448 may expose parts of the original document in error logs when indexing fails.