All the vulnerabilites related to fluentd - fluentd
cve-2017-10906
Vulnerability from cvelistv5
Published
2017-12-08 15:00
Modified
2024-08-05 17:50
Severity ?
EPSS score ?
Summary
Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2225 | vendor-advisory, x_refsource_REDHAT | |
https://jvn.jp/en/vu/JVNVU95124098/index.html | x_refsource_MISC | |
https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes | x_refsource_CONFIRM | |
https://github.com/fluent/fluentd/pull/1733 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cloud Native Computing Foundation (CNCF) | Fluentd |
Version: 0.12.29 through 0.12.40 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:50:12.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2225", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2225" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU95124098/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fluent/fluentd/pull/1733" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fluentd", "vendor": "Cloud Native Computing Foundation (CNCF)", "versions": [ { "status": "affected", "version": "0.12.29 through 0.12.40" } ] } ], "datePublic": "2017-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Escape Sequence Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T09:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "RHSA-2018:2225", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2225" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU95124098/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fluent/fluentd/pull/1733" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2017-10906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fluentd", "version": { "version_data": [ { "version_value": "0.12.29 through 0.12.40" } ] } } ] }, "vendor_name": "Cloud Native Computing Foundation (CNCF)" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escape Sequence Injection" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2225", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2225" }, { "name": "https://jvn.jp/en/vu/JVNVU95124098/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU95124098/index.html" }, { "name": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes", "refsource": "CONFIRM", "url": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes" }, { "name": "https://github.com/fluent/fluentd/pull/1733", "refsource": "CONFIRM", "url": "https://github.com/fluent/fluentd/pull/1733" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2017-10906", "datePublished": "2017-12-08T15:00:00", "dateReserved": "2017-07-04T00:00:00", "dateUpdated": "2024-08-05T17:50:12.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-21514
Vulnerability from cvelistv5
Published
2023-04-04 00:00
Modified
2024-08-04 14:30
Severity ?
EPSS score ?
Summary
An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:30:32.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/fluent/fluentd/issues/2722" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/fluent/fluentd/issues/2722" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-21514", "datePublished": "2023-04-04T00:00:00", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-08-04T14:30:32.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39379
Vulnerability from cvelistv5
Published
2022-11-02 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135" }, { "name": "FEDORA-2023-6b9e2a6534", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "fluentd", "vendor": "fluent", "versions": [ { "status": "affected", "version": "\u003e= 1.13.2, \u003c 1.15.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2" }, { "url": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135" }, { "name": "FEDORA-2023-6b9e2a6534", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/" } ], "source": { "advisory": "GHSA-fppq-mj76-fpj2", "discovery": "UNKNOWN" }, "title": "Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39379", "datePublished": "2022-11-02T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41186
Vulnerability from cvelistv5
Published
2021-10-29 13:40
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "fluentd", "vendor": "fluent", "versions": [ { "status": "affected", "version": "\u003e= 0.14.14, \u003c 1.14.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don\u0027t use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-29T13:40:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md" } ], "source": { "advisory": "GHSA-hwhf-64mh-r662", "discovery": "UNKNOWN" }, "title": "ReDoS vulnerability in parser_apache2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41186", "STATE": "PUBLIC", "TITLE": "ReDoS vulnerability in parser_apache2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "fluentd", "version": { "version_data": [ { "version_value": "\u003e= 0.14.14, \u003c 1.14.2" } ] } } ] }, "vendor_name": "fluent" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don\u0027t use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd)." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662", "refsource": "CONFIRM", "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662" }, { "name": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142", "refsource": "MISC", "url": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142" }, { "name": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md", "refsource": "MISC", "url": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md" } ] }, "source": { "advisory": "GHSA-hwhf-64mh-r662", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41186", "datePublished": "2021-10-29T13:40:10", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-10-29 14:15
Modified
2024-11-21 06:25
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluentd:fluentd:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AE50BF8-39BA-4467-AA78-83E6BDAD86FF", "versionEndIncluding": "1.14.1", "versionStartIncluding": "0.14.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don\u0027t use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd)." }, { "lang": "es", "value": "Fluentd recoge eventos de varias fuentes de datos y los escribe en archivos para ayudar a unificar la infraestructura de registro. El plugin parser_apache2 en Fluentd versiones v0.14.14 hasta v1.14.1 sufre una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS). Un registro de apache roto con un determinado patr\u00f3n de cadena puede pasar demasiado tiempo en una expresi\u00f3n regular, resultando en un potencial de un ataque DoS. Este problema est\u00e1 parcheado en la versi\u00f3n 1.14.2. Se presentan dos soluciones disponibles. O bien no usar parser_apache2 para analizar los registros (que no pueden ser garantizados por Apache), o poner la versi\u00f3n parcheada de parser_apache2.rb en el directorio /etc/fluent/plugin (o cualquier otro directorio especificado por la variable de entorno \"FLUENT_PLUGIN\" o \"--plugin\" de fluentd)" } ], "id": "CVE-2021-41186", "lastModified": "2024-11-21T06:25:42.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-29T14:15:07.730", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-08 15:29
Modified
2024-11-21 03:06
Severity ?
Summary
Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://access.redhat.com/errata/RHSA-2018:2225 | Third Party Advisory | |
vultures@jpcert.or.jp | https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes | Issue Tracking, Release Notes, Third Party Advisory | |
vultures@jpcert.or.jp | https://github.com/fluent/fluentd/pull/1733 | Issue Tracking, Patch, Third Party Advisory | |
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU95124098/index.html | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2225 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes | Issue Tracking, Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fluent/fluentd/pull/1733 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU95124098/index.html | Issue Tracking, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fluentd | fluentd | 0.12.29 | |
fluentd | fluentd | 0.12.30 | |
fluentd | fluentd | 0.12.31 | |
fluentd | fluentd | 0.12.32 | |
fluentd | fluentd | 0.12.33 | |
fluentd | fluentd | 0.12.34 | |
fluentd | fluentd | 0.12.35 | |
fluentd | fluentd | 0.12.36 | |
fluentd | fluentd | 0.12.37 | |
fluentd | fluentd | 0.12.38 | |
fluentd | fluentd | 0.12.39 | |
fluentd | fluentd | 0.12.40 | |
redhat | openstack | 13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.29:*:*:*:*:*:*:*", "matchCriteriaId": "E239F1C0-FF43-4BAA-9D5B-3B7E9FEA327C", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.30:*:*:*:*:*:*:*", "matchCriteriaId": "2086C8D1-DDC8-4074-95E5-82865839DCA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.31:*:*:*:*:*:*:*", "matchCriteriaId": "8BC7FD40-1F7D-4A02-98DC-08A076DDD927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.32:*:*:*:*:*:*:*", "matchCriteriaId": "93F62B56-8953-4EE8-94B8-64E354EC60D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.33:*:*:*:*:*:*:*", "matchCriteriaId": "ABC5C48D-08B0-4477-AB11-168429985D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.34:*:*:*:*:*:*:*", "matchCriteriaId": "46F12BEC-8EDE-47B2-ADBF-EAF5FDB56E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.35:*:*:*:*:*:*:*", "matchCriteriaId": "E27DE234-F139-4964-A0C2-6AFEB48E3712", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "4257D676-4D0B-4470-BEA6-437CE56DF3FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.37:*:*:*:*:*:*:*", "matchCriteriaId": "35209FD8-F148-446B-8FE9-36AD908D9A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.38:*:*:*:*:*:*:*", "matchCriteriaId": "6DCDBCBA-8F48-47E0-8E04-D69890CAC887", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.39:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BAA6D-4AB9-4323-A799-D5B2DAA65785", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd:0.12.40:*:*:*:*:*:*:*", "matchCriteriaId": "D89D4AAD-EE06-4485-A2F7-04B8222B6968", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de secuencias de escape en Fluentd en las versiones 0.12.29 hasta la 0.12.40 podr\u00eda permitir que un atacante cambie la interfaz de usuario del terminal o ejecute comandos arbitrarios en el dispositivo mediante vectores sin especificar." } ], "id": "CVE-2017-10906", "lastModified": "2024-11-21T03:06:43.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-08T15:29:00.260", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2225" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/pull/1733" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU95124098/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/blob/v0.12/CHANGELOG.md#bug-fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/pull/1733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU95124098/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-04 15:15
Modified
2024-11-21 05:12
Severity ?
Summary
An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/fluent/fluentd/issues/2722 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/fluent/fluentd/issues/2722 | Exploit, Issue Tracking |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fluentd | fluentd | 1.8.0 | |
fluentd | fluentd-ui | 1.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluentd:fluentd:1.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "A57DB6B3-202A-4B44-A484-D63028657CB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fluentd:fluentd-ui:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C5C3718-E27B-4276-ACB1-8EE459262C22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password." } ], "id": "CVE-2020-21514", "lastModified": "2024-11-21T05:12:38.313", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-04T15:15:08.187", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/fluent/fluentd/issues/2722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/fluent/fluentd/issues/2722" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-02 13:15
Modified
2024-11-21 07:18
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fluentd | fluentd | * | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluentd:fluentd:*:*:*:*:*:*:*:*", "matchCriteriaId": "242E386A-FF76-40A5-908E-A4D7C13D7DD7", "versionEndExcluding": "1.15.3", "versionStartIncluding": "1.13.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`." }, { "lang": "es", "value": "Fluentd recopila eventos de diversas fuentes de datos y los escribe en archivos, RDBMS, NoSQL, IaaS, SaaS, Hadoop, etc. Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en configuraciones no predeterminadas de Fluentd permite a atacantes no autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de payloads JSON especialmente manipulados. Las configuraciones de Fluentd solo se ven afectadas si la variable de entorno `FLUENT_OJ_OPTION_MODE` se establece expl\u00edcitamente en `object`. Tenga en cuenta: la opci\u00f3n FLUENT_OJ_OPTION_MODE se introdujo en la versi\u00f3n 1.13.2 de Fluentd. Las versiones anteriores de Fluentd no se ven afectadas por esta vulnerabilidad. Este problema se solucion\u00f3 en la versi\u00f3n 1.15.3. Como workaround alternativo, no utilice `FLUENT_OJ_OPTION_MODE=object`." } ], "id": "CVE-2022-39379", "lastModified": "2024-11-21T07:18:10.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-02T13:15:13.583", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }