// For flags

CVE-2022-39379

Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.

Fluentd recopila eventos de diversas fuentes de datos y los escribe en archivos, RDBMS, NoSQL, IaaS, SaaS, Hadoop, etc. Una vulnerabilidad de ejecución remota de código (RCE) en configuraciones no predeterminadas de Fluentd permite a atacantes no autenticados ejecutar código arbitrario a través de payloads JSON especialmente manipulados. Las configuraciones de Fluentd solo se ven afectadas si la variable de entorno `FLUENT_OJ_OPTION_MODE` se establece explícitamente en `object`. Tenga en cuenta: la opción FLUENT_OJ_OPTION_MODE se introdujo en la versión 1.13.2 de Fluentd. Las versiones anteriores de Fluentd no se ven afectadas por esta vulnerabilidad. Este problema se solucionó en la versión 1.15.3. Como workaround alternativo, no utilice `FLUENT_OJ_OPTION_MODE=object`.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-11-02 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fluentd
Search vendor "Fluentd"
Fluentd
Search vendor "Fluentd" for product "Fluentd"
>= 1.13.2 < 1.15.3
Search vendor "Fluentd" for product "Fluentd" and version " >= 1.13.2 < 1.15.3"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
37
Search vendor "Fedoraproject" for product "Fedora" and version "37"
-
Affected