Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-39379
HistoryNov 02, 2022 - 1:15 p.m.

Remote code execution

2022-11-0213:15:00
PRIOn knowledge base
www.prio-n.com
3
fluentd
remote code execution
json payloads
vulnerability
workaround

9.8 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use FLUENT_OJ_OPTION_MODE=object.

CPENameOperatorVersion
fedoraeq37
fluentdge1.13.2
fluentdlt1.15.3

9.8 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.1%