BIT-fluentd-2022-39379

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/fluentd/BIT-fluentd-2022-39379.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-fluentd-2022-39379
Aliases
Published
2024-03-06T10:51:50.613Z
Modified
2025-04-03T14:40:37.652Z
Summary
[none]
Details

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object. Please note: The option FLUENTOJOPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use FLUENT_OJ_OPTION_MODE=object.

Database specific
{
    "cpes": [
        "cpe:2.3:a:fluentd:fluentd:*:*:*:*:*:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / fluentd

Package

Name
fluentd
Purl
pkg:bitnami/fluentd

Severity

  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.13.2
Fixed
1.15.3