cve/2019/CVE-2019-7617.md

19 lines
840 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-7617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7617)
![](https://img.shields.io/static/v1?label=Product&message=Elastic%20APM%20agent%20for%20Python&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
### Description
When the Elastic APM agent for Python versions before 5.1.0 is run as a CGI script, there is a variable name clash flaw if a remote attacker can control the proxy header. This could result in an attacker redirecting collected APM data to a proxy of their choosing.
### POC
#### Reference
- https://www.elastic.co/community/security/
2024-06-09 00:33:16 +00:00
- https://www.elastic.co/community/security/
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.