Description
In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9289 | In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data. |
References
History
No history.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2024-08-03T18:30:24.012Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-22138
No data.
Status : Modified
Published: 2021-05-13T18:15:09.077
Modified: 2024-11-21T05:49:34.800
Link: CVE-2021-22138
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD