Description
A TLS certificate validation flaw was found in Elastic APM agent for Ruby versions before 2.9.0. When specifying a trusted server CA certificate via the 'server_ca_cert' setting, the Ruby agent would not properly verify the certificate returned by the APM server. This could result in a man in the middle style attack against the Ruby agent.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2113 | A TLS certificate validation flaw was found in Elastic APM agent for Ruby versions before 2.9.0. When specifying a trusted server CA certificate via the 'server_ca_cert' setting, the Ruby agent would not properly verify the certificate returned by the APM server. This could result in a man in the middle style attack against the Ruby agent. |
Github GHSA |
GHSA-35j2-p8fh-x966 | Elastic APM agent for Ruby vulnerable to Improper Certificate Validation |
References
| Link | Providers |
|---|---|
| https://www.elastic.co/community/security/ |
|
History
No history.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-04T20:54:27.931Z
Reserved: 2019-02-07T00:00:00.000Z
Link: CVE-2019-7615
No data.
Status : Modified
Published: 2019-07-30T22:15:12.660
Modified: 2024-11-21T04:48:24.420
Link: CVE-2019-7615
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA