Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4r5r-ccr6-q6f6

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.1

Описание

Fleet has an Access Control vulnerability in debug/pprof endpoints

Summary

A broken access control issue in Fleet allowed authenticated users to access debug and profiling endpoints regardless of role. As a result, low-privilege users could view internal server diagnostics and trigger resource-intensive profiling operations.

Impact

Fleet’s debug/pprof endpoints are accessible to any authenticated user regardless of role, including the lowest-privilege “Observer” role. This allows low-privilege users to access sensitive server internals, including runtime profiling data and in-memory application state, and to trigger CPU-intensive profiling operations that could lead to denial of service.

Patches

  • 4.78.3
  • 4.77.1
  • 4.76.2
  • 4.75.2
  • 4.53.3

Workarounds

If an immediate upgrade is not possible, users should put the debug/pprof endpoints behind an IP allowlist.

For more information

If you have any questions or comments about this advisory:

Email us at security@fleetdm.com Join #fleet in osquery Slack

Credits

We thank @secfox-ai for responsibly reporting this issue.

Пакеты

Наименование

github.com/fleetdm/fleet

go
Затронутые версииВерсия исправления

>= 4.78.0, < 4.78.3

4.78.3

Наименование

github.com/fleetdm/fleet

go
Затронутые версииВерсия исправления

>= 4.77.0, < 4.77.1

4.77.1

Наименование

github.com/fleetdm/fleet

go
Затронутые версииВерсия исправления

>= 4.76.0, < 4.76.2

4.76.2

Наименование

github.com/fleetdm/fleet

go
Затронутые версииВерсия исправления

>= 4.75.0, < 4.75.2

4.75.2

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

< 4.78.3-0.20260112221730-5c030e32a3a9

4.78.3-0.20260112221730-5c030e32a3a9

EPSS

Процентиль: 13%
0.00043
Низкий

7.1 High

CVSS4

Дефекты

CWE-862
CWE-863

Связанные уязвимости

nvd
18 дней назад

Fleet is open source device management software. A broken access control issue in versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 allowed authenticated users to access debug and profiling endpoints regardless of role. As a result, low-privilege users could view internal server diagnostics and trigger resource-intensive profiling operations. Fleet’s debug/pprof endpoints are accessible to any authenticated user regardless of role, including the lowest-privilege “Observer” role. This allows low-privilege users to access sensitive server internals, including runtime profiling data and in-memory application state, and to trigger CPU-intensive profiling operations that could lead to denial of service. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, users should put the debug/pprof endpoints behind an IP allowlist as a workaround.

EPSS

Процентиль: 13%
0.00043
Низкий

7.1 High

CVSS4

Дефекты

CWE-862
CWE-863