Insertion of Sensitive Information into Log File Affecting org.elasticsearch:elasticsearch package, versions [7.0.0,7.17.16)[8.0.0,8.11.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGELASTICSEARCH-6125580
  • published14 Dec 2023
  • disclosed12 Dec 2023
  • creditUnknown

Introduced: 12 Dec 2023

CVE-2023-49921  (opens in a new tab)
CWE-779  (opens in a new tab)

How to fix?

Upgrade org.elasticsearch:elasticsearch to version 7.17.16, 8.11.2 or higher.

Overview

org.elasticsearch:elasticsearch is a Distributed, RESTful Search Engine.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File due to the logging of Watcher search input at the DEBUG log level, which may result in the unintended recording of sensitive information in log files. An attacker can gain access to sensitive data by examining the log files that contain the search query results.

Note:

This issue only affects users that use Watcher and have a Watch defined that uses the search input and additionally have set the search input’s logger to DEBUG or finer, for example using:

org.elasticsearch.xpack.watcher.input.search

org.elasticsearch.xpack.watcher.input

org.elasticsearch.xpack.watcher or wider, since the loggers are hierarchical.

Workaround

For users that cannot upgrade, if you use Watcher with search input logger set to DEBUG, the logging level can be set to INFO or higher (WARN, ERROR).

CVSS Scores

version 3.1