Insertion of Sensitive Information into Log File Affecting github.com/elastic/fleet-server/internal/pkg/api package, versions >=8.10.0 <8.10.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMELASTICFLEETSERVERINTERNALPKGAPI-6042541
  • published1 Nov 2023
  • disclosed26 Oct 2023
  • creditUnknown

Introduced: 26 Oct 2023

CVE-2023-46667  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade github.com/elastic/fleet-server/internal/pkg/api to version 8.10.3 or higher.

Overview

github.com/elastic/fleet-server/internal/pkg/api is a control server to manage a fleet of elastic-agents.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File when the agent enrolment tokens are processed. An attacker can enroll an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services by exploiting the insertion of these tokens into the Fleet Server's log file in plain text. Alternatively, a threat actor could potentially enroll agents to the clusters and send arbitrary events to Elasticsearch.

CVSS Scores

version 3.1