2 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

06 May 2025 — Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set. • https://discuss.elastic.co/t/logstash-8-17-6-8-18-1-and-9-0-1-security-update-esa-2025-08/377869 • CWE-295: Improper Certificate Validation •

CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 0

15 Nov 2023 — An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances. The prerequisites for the manifestation of this issue are: * Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging format. * Sensitive data is stored in the Logstash keystore and referenced as a variable in Logstash configuration. Elastic identificó un problema por el cual se r... • https://discuss.elastic.co/t/logstash-8-11-1-security-update-esa-2023-26/347191 • CWE-532: Insertion of Sensitive Information into Log File •