cve/2023/CVE-2023-46668.md

18 lines
966 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-46668](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46668)
![](https://img.shields.io/static/v1?label=Product&message=Endpoint&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.9.0%2C%208.10.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brighgreen)
### Description
If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts.
### POC
#### Reference
- https://www.elastic.co/community/security
#### Github
No PoCs found on GitHub currently.