Improper certificate validation in Logstash's TCP output...
Moderate severity
Unreviewed
Published
May 6, 2025
to the GitHub Advisory Database
•
Updated May 6, 2025
Description
Published by the National Vulnerability Database
May 6, 2025
Published to the GitHub Advisory Database
May 6, 2025
Last updated
May 6, 2025
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
References