A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/apm-java-agent-security-update/289627 | Vendor Advisory |
Configurations
History
14 Dec 2021, 00:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.4
v3 : 7.8 |
References | (MISC) https://discuss.elastic.co/t/apm-java-agent-security-update/289627 - Vendor Advisory | |
CPE | cpe:2.3:a:elastic:apm_agent:*:*:*:*:*:java:*:* | |
CWE | CWE-269 |
08 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-08 22:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-37941
Mitre link : CVE-2021-37941
CVE.ORG link : CVE-2021-37941
JSON object : View
Products Affected
elastic
- apm_agent
CWE
CWE-269
Improper Privilege Management