UNCLASSIFIED - NO CUI

Skip to content

chore(findings): elastic/logstash/logstash

Summary

elastic/logstash/logstash has 18 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=elastic/logstash/logstash&tag=7.17.28&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2024-32002 Anchore CVE Critical git-1.10.2 0.77245 false
CVE-2025-48384 Anchore CVE High git-1.10.2 0.04084 true
CVE-2022-24836 Twistlock CVE High nokogiri-1.12.5 For an application to be affected, the input to the HTML4 parse method must be an untrusted string with ASCII8BIT encoding, and there must be no encoding argument passed to the parse method.Untrusted input without a specified encoding passed to the parse method is a rather common use case that spans the transitive users of Loofah and RailsHtmlSanitizer.However, the requirement that the string have ASCII8BIT encoding is rather less common in modern Ruby ASCII8BIT is an alias for BINARY implying no encoding, and should not be confused with ASCII which is an alias for USASCII encoding. 0.01203 false
CVE-2024-49761 Twistlock CVE High rexml-3.2.6 0.00343 false
CVE-2025-46727 Twistlock CVE High rack-2.2.11 0.00291 false
CVE-2025-27818 Anchore CVE High kafka_2.12-2.8.1 0.00226 false
CVE-2025-27818 Anchore CVE High kafka-clients-2.8.1 0.00226 false
CVE-2025-50106 Anchore CVE High openjdk-11.0.26+4 0.00174 false
CVE-2025-30749 Anchore CVE High openjdk-11.0.26+4 0.00174 false
CVE-2025-48385 Anchore CVE High git-1.10.2 0.00112 false
CVE-2025-52999 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.14.1 0.00072 false
CVE-2025-50059 Anchore CVE High openjdk-11.0.26+4 0.00054 false
CVE-2025-58057 Twistlock CVE Medium io.netty_netty-codec-4.1.87.Final N/A false
GHSA-h46c-h94j-95f3 Anchore CVE High jackson-core-2.14.1 N/A N/A
GHSA-h46c-h94j-95f3 Anchore CVE High jackson-core-2.14.1 N/A N/A
GHSA-h46c-h94j-95f3 Anchore CVE High jackson-core-2.14.1 N/A N/A
GHSA-cgx6-hpwq-fhv5 Anchore CVE High nokogiri-1.12.5 N/A N/A
GHSA-6f62-3596-g6w7 Anchore CVE High webrick-1.6.1 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=elastic/logstash/logstash&tag=7.17.28&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information