Lucene search

K
cve[email protected]CVE-2022-39379
HistoryNov 02, 2022 - 1:15 p.m.

CVE-2022-39379

2022-11-0213:15:13
CWE-502
web.nvd.nist.gov
65
4
fluentd
rce
cve-2022-39379
json
security vulnerability
patch
nvd
workaround

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use FLUENT_OJ_OPTION_MODE=object.

Affected configurations

Vulners
NVD
Node
fluentfluentdRange1.13.21.15.3
CPENameOperatorVersion
fluentd:fluentdfluentdlt1.15.3

CNA Affected

[
  {
    "vendor": "fluent",
    "product": "fluentd",
    "versions": [
      {
        "version": ">= 1.13.2, < 1.15.3",
        "status": "affected"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%