Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-39379

Опубликовано: 02 нояб. 2022
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use FLUENT_OJ_OPTION_MODE=object.

A remote code execution (RCE) vulnerability was found in non-default configurations of Fluentd. This issue allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.

Отчет

The Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object, which is a non-default configuration. Hence, this CVE is categorized as Moderate impact.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/fluentd-rhel8Not affected
Red Hat OpenShift Container Platform 3.11fluentdOut of support scope
Red Hat OpenShift Container Platform 3.11openshift3/logging-fluentdOut of support scope
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-fluentdOut of support scope
Red Hat OpenStack Platform 13 (Queens)puppet-fluentdOut of support scope
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-fluentdOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2142460fluentd: remote code execution via crafted JSON payloads

EPSS

Процентиль: 89%
0.04991
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
больше 3 лет назад

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.

CVSS3: 9.8
msrc
около 3 лет назад

Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)

CVSS3: 3.1
debian
больше 3 лет назад

Fluentd collects events from various data sources and writes them to f ...

CVSS3: 3.1
github
больше 3 лет назад

fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)

EPSS

Процентиль: 89%
0.04991
Низкий

8.1 High

CVSS3