Miggo Logo

CVE-2021-22143: Exposure of Sensitive Information in Elastic APM .NET Agent

2.1

CVSS Score
3.1

Basic Information

EPSS Score
0.42705%
Published
11/22/2023
Updated
12/5/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Elastic.Apmnuget< 1.10.01.10.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing header sanitization in two key areas: 1) When initially reading headers for transactions (WebRequestTransactionCreator.GetHeaders and ElasticApmModule.ConvertHeaders), and 2) When handling error contexts (Error class). The patch added WildcardMatcher checks in these locations and introduced the ErrorContextSanitizerFilter. The vulnerable functions directly handled header data without these sanitization checks prior to 1.10.0, matching the CWE-200/CWE-532 exposure described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *l*sti* *PM .N*T ***nt **n l**k s*nsitiv* *TTP *****r in*orm*tion w**n lo**in* t** **t*ils *urin* *n *ppli**tion *rror. Norm*lly, t** *PM ***nt will s*nitiz* s*nsitiv* *TTP *****r **t*ils ***or* s*n*in* t** in*orm*tion to t** *PM s*rv*r. *urin* *

Reasoning

T** vuln*r**ility st*mm** *rom missin* *****r s*nitiz*tion in two k*y *r**s: *) W**n initi*lly r***in* *****rs *or tr*ns**tions (W**R*qu*stTr*ns**tion*r**tor.**t*****rs *n* *l*sti**pmMo*ul*.*onv*rt*****rs), *n* *) W**n **n*lin* *rror *ont*xts (*rror