Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)
Vulnerability Description
Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
可信数据的反序列化
Vulnerability Title
Fluentd 代码问题漏洞
Vulnerability Description
Fluentd是Fluentd开源的一个开源日志收集器。从各种数据源收集事件,并将其写入文件、RDBMS、NoSQL、IaaS、SaaS、Hadoop等。 Fluentd 存在安全漏洞。攻击者利用该漏洞通过特制的JSON有效载荷执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A