QID 376192
Date Published: 2021-12-20
QID 376192: Elasticsearch Logstash Log4j Remote Code Execution (RCE) Vulnerability
ElasticSearch Logstash is an open source, server-side data processing pipeline that ingests data from a multitude of sources simultaneously, transforms it, and then sends it to your favorite 'stash'.
Affected Versions
Elasticsearch Logstash version(s) 5.0.0 upto 6.8.20
Elasticsearch Logstash version(s) 7.x.x upto 7.16.0
QID Detection Logic (Authenticated):
This QID checks for vulnerable versions of Elasticsearch Logstash present on the target.
A malicious actor with network access can exploit this issue to gain full control of the target system.
Solution
Customers are advised to following versions of Logstash. Refer to Logstash 7.16.2, Logstash 6.8.22Workaround:
Removal of the JndiLookup class from the Log4j library. For more details check out removing JndiLookup
Vendor References
CVEs related to QID 376192
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Logstash 6.8.22 |
|
||
| Logstash 7.16.2 |
|