Количество 4
Количество 4
CVE-2025-12969
Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mechanism under certain configuration conditions. This allows remote attackers with network access to the Fluent Bit instance exposing the forward input to send unauthenticated data. By bypassing authentication controls, attackers can inject forged log records, flood alerting systems, or manipulate routing decisions, compromising the authenticity and integrity of ingested logs.
CVE-2025-12969
CVE-2025-12969
GHSA-2949-r76x-4vc4
Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mechanism under certain configuration conditions. This allows remote attackers with network access to the Fluent Bit instance exposing the forward input to send unauthenticated data. By bypassing authentication controls, attackers can inject forged log records, flood alerting systems, or manipulate routing decisions, compromising the authenticity and integrity of ingested logs.
BDU:2025-15406
Уязвимость плагина in_forward инструмента для сбора и обработки логов Fluent Bit, позволяющая нарушителю обойти существующие ограничения безопасности и получить доступ к системе
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-12969 Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mechanism under certain configuration conditions. This allows remote attackers with network access to the Fluent Bit instance exposing the forward input to send unauthenticated data. By bypassing authentication controls, attackers can inject forged log records, flood alerting systems, or manipulate routing decisions, compromising the authenticity and integrity of ingested logs. | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-12969 CVE-2025-12969 | CVSS3: 6.5 | 0% Низкий | 2 месяца назад | |
GHSA-2949-r76x-4vc4 Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mechanism under certain configuration conditions. This allows remote attackers with network access to the Fluent Bit instance exposing the forward input to send unauthenticated data. By bypassing authentication controls, attackers can inject forged log records, flood alerting systems, or manipulate routing decisions, compromising the authenticity and integrity of ingested logs. | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
BDU:2025-15406 Уязвимость плагина in_forward инструмента для сбора и обработки логов Fluent Bit, позволяющая нарушителю обойти существующие ограничения безопасности и получить доступ к системе | CVSS3: 6.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу