CVE-2022-39379Deserialization of Untrusted Data in Fluentd

Severity
9.8CRITICALNVD
EPSS
7.7%
top 8.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 2
Latest updateNov 8

Description

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.1

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDfluentd/fluentd1.13.21.15.3
RubyGemsfluentd/fluentd1.13.21.15.3
CVEListV5fluent/fluentd>= 1.13.2, < 1.15.3

Also affects: Fedora 37

Patches

🔴Vulnerability Details

2
OSV
fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)2022-11-02
GHSA
fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)2022-11-02

📋Vendor Advisories

2
Microsoft
Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)2022-11-08
Red Hat
fluentd: remote code execution via crafted JSON payloads2022-11-02
CVE-2022-39379 — Deserialization of Untrusted Data | cvebase