QID 376192

Date Published: 2021-12-20

QID 376192: Elasticsearch Logstash Log4j Remote Code Execution (RCE) Vulnerability

ElasticSearch Logstash is an open source, server-side data processing pipeline that ingests data from a multitude of sources simultaneously, transforms it, and then sends it to your favorite 'stash'.

Affected Versions
Elasticsearch Logstash version(s) 5.0.0 upto 6.8.20
Elasticsearch Logstash version(s) 7.x.x upto 7.16.0

QID Detection Logic (Authenticated):
This QID checks for vulnerable versions of Elasticsearch Logstash present on the target.

A malicious actor with network access can exploit this issue to gain full control of the target system.

  • CVSS V3 rated as Critical - 10 severity.
  • CVSS V2 rated as Critical - 9.3 severity.
  • Solution
    Customers are advised to following versions of Logstash. Refer to Logstash 7.16.2, Logstash 6.8.22Workaround:

    Removal of the JndiLookup class from the Log4j library. For more details check out removing JndiLookup

    CVEs related to QID 376192

    Software Advisories
    Advisory ID Software Component Link
    Logstash 6.8.22 URL Logo www.elastic.co/guide/en/logstash/6.8/logstash-6-8-22.html
    Logstash 7.16.2 URL Logo www.elastic.co/guide/en/logstash/current/logstash-7-16-2.html