BIT-fluentd-2022-39379

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/fluentd/BIT-fluentd-2022-39379.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-fluentd-2022-39379
Aliases
Published
2024-03-06T10:51:50.613Z
Modified
2024-11-27T19:40:48.342Z
Summary
[none]
Details

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object. Please note: The option FLUENTOJOPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use FLUENT_OJ_OPTION_MODE=object.

Database specific
{
    "cpes": [
        "cpe:2.3:a:fluentd:fluentd:*:*:*:*:*:*:*:*"
    ],
    "severity": "Low"
}
References

Affected packages

Bitnami / fluentd

Package

Name
fluentd
Purl
pkg:bitnami/fluentd

Severity

  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.13.2
Fixed
1.15.3