Insertion of Sensitive Information into Log File Affecting github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator package, versions >=8.6.0 <8.15.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMELASTICELASTICAGENTINTERNALPKGAGENTAPPLICATIONCOORDINATOR-7660063
  • published9 Aug 2024
  • disclosed8 Aug 2024
  • creditUnknown

Introduced: 8 Aug 2024

CVE-2024-37283  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator to version 8.15.0 or higher.

Overview

github.com/elastic/elastic-agent/internal/pkg/agent/application/coordinator is a single, unified way to add monitoring for logs, metrics, and other types of data to a host

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File when logging at debug level, which is not the default. An attacker can retrieve secrets from elastic-agent.yml, which are written into logs.

Workaround

This vulnerability can be avoided by adding an ingest processor to filter out components log lines in debug mode.

CVSS Scores

version 4.0
version 3.1