FreeBSD : logstash -- password disclosure vulnerability (f2d4f879-0d7c-11e6-925f-6805ca0b3d42)

high Nessus Plugin ID 90781

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Logstash developers report : Passwords Printed in Log Files under Some Conditions It was discovered that, in Logstash 2.1.0+, log messages generated by a stalled pipeline during shutdown will print plaintext contents of password fields. While investigating this issue we also discovered that debug logging has included this data for quite some time. Our latest releases fix both leaks. You will want to scrub old log files if this is of particular concern to you. This was fixed in issue #4965

Solution

Update the affected package.

See Also

http://www.nessus.org/u?90074391

https://github.com/elastic/logstash/pull/4965

http://www.nessus.org/u?dbc1fed3

Plugin Details

Severity: High

ID: 90781

File Name: freebsd_pkg_f2d4f8790d7c11e6925f6805ca0b3d42.nasl

Version: 2.3

Type: local

Published: 4/29/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:logstash, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/28/2016

Vulnerability Publication Date: 4/1/2016