File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ---
2+ gem : fluentd
3+ cve : 2022-39379
4+ ghsa : fppq-mj76-fpj2
5+ url : https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2
6+ title : fluentd vulnerable to remote code execution due to insecure deserialization
7+ (in non-default configuration)
8+ date : 2022-11-02
9+ description : |
10+ ### Impact
11+ A remote code execution (RCE) vulnerability in non-default configurations of
12+ Fluentd allows unauthenticated attackers to execute arbitrary code via
13+ specially crafted JSON payloads.
14+
15+ Fluentd setups are only affected if the environment variable
16+ `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`.
17+
18+ Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd
19+ version 1.13.2. Earlier versions of Fluentd are not affected by this
20+ vulnerability.
21+
22+ ### Patches
23+ v1.15.3
24+
25+ ### Workarounds
26+ Do not use `FLUENT_OJ_OPTION_MODE=object`.
27+
28+ ### References
29+ * GHSL-2022-067
30+ cvss_v3 : 3.1
31+ unaffected_versions :
32+ - " < 1.13.2"
33+ patched_versions :
34+ - " >= 1.15.3"
35+ related :
36+ url :
37+ - https://securitylab.github.com/advisories/GHSL-2022-067_fluentd/
38+ - https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135
You can’t perform that action at this time.
0 commit comments