CVE-2021-22143: Exposure of Sensitive Information in Elastic APM .NET Agent
2.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42705%
CWE
Published
11/22/2023
Updated
12/5/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Elastic.Apm | nuget | < 1.10.0 | 1.10.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing header sanitization in two key areas: 1) When initially reading headers for transactions (WebRequestTransactionCreator.GetHeaders and ElasticApmModule.ConvertHeaders), and 2) When handling error contexts (Error class). The patch added WildcardMatcher checks in these locations and introduced the ErrorContextSanitizerFilter. The vulnerable functions directly handled header data without these sanitization checks prior to 1.10.0, matching the CWE-200/CWE-532 exposure described in the advisory.