Skip to content

Commit d97d6c7

Browse files
committed
Sync with GitHub Security Advisories
* Add CVE-2022-39379 for fluentd
1 parent a7ff9ca commit d97d6c7

1 file changed

Lines changed: 38 additions & 0 deletions

File tree

gems/fluentd/CVE-2022-39379.yml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
gem: fluentd
3+
cve: 2022-39379
4+
ghsa: fppq-mj76-fpj2
5+
url: https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2
6+
title: fluentd vulnerable to remote code execution due to insecure deserialization
7+
(in non-default configuration)
8+
date: 2022-11-02
9+
description: |
10+
### Impact
11+
A remote code execution (RCE) vulnerability in non-default configurations of
12+
Fluentd allows unauthenticated attackers to execute arbitrary code via
13+
specially crafted JSON payloads.
14+
15+
Fluentd setups are only affected if the environment variable
16+
`FLUENT_OJ_OPTION_MODE` is explicitly set to `object`.
17+
18+
Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd
19+
version 1.13.2. Earlier versions of Fluentd are not affected by this
20+
vulnerability.
21+
22+
### Patches
23+
v1.15.3
24+
25+
### Workarounds
26+
Do not use `FLUENT_OJ_OPTION_MODE=object`.
27+
28+
### References
29+
* GHSL-2022-067
30+
cvss_v3: 3.1
31+
unaffected_versions:
32+
- "< 1.13.2"
33+
patched_versions:
34+
- ">= 1.15.3"
35+
related:
36+
url:
37+
- https://securitylab.github.com/advisories/GHSL-2022-067_fluentd/
38+
- https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135

0 commit comments

Comments
 (0)