Bug 1942553 (CVE-2021-22133)
Summary: | CVE-2021-22133 go.elastic.co/apm: leaks sensitive HTTP headers during panic | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Michael Kaplan <mkaplan> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | alegrand, anpicker, aos-bugs, aos-install, bbennett, bmontgom, bthurber, cnv-qe-bugs, dbecker, eparis, erooth, fdeutsch, gghezzo, gparvin, hvyas, jburrell, jhrozek, jjoyce, jokerman, josorior, jramanat, jschluet, jweiser, kakkoyun, lcosic, lhh, lpeer, mburns, mrogers, nstielau, oyahud, pdhamdhe, phoracek, pkrupa, rhos-maint, sclewis, shardy, slinaber, sponnaga, stcannon, stirabos, surbania, team-winc, thee, xiyuan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | go.elastic.co/apm 1.11.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Elastic APM agent for Go in several versions, where it can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic, it is possible the headers will not be sanitized before being sent. The highest threat from this vulnerability is to confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-07-28 01:07:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1945500 | ||
Bug Blocks: | 1942559 |
Description
Michael Kaplan
2021-03-24 14:31:24 UTC
External References: https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252 Upstream fix: https://github.com/elastic/apm-agent-go/pull/888 Closing Hosted* notaffected. Statement: Several components in the below products include an old reference to go.elastic.co/apm in their go.sum files, however no code is included. These components are thus not affected by this vulnerability. * OpenShift Container Platform * OpenShift Virtualization * OpenShift Container Storage 4 * Red Hat Advanced Cluster for Kubernetes (RHACM) This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2021:2438 https://access.redhat.com/errata/RHSA-2021:2438 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-22133 |