Authentication Bypass Using an Alternate Path or Channel Affecting org.graylog2:graylog2-server package, versions [6.1.0,6.1.9)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGGRAYLOG2-9668945
  • published7 Apr 2025
  • disclosed7 Apr 2025
  • creditUnknown

Introduced: 7 Apr 2025

NewCVE-2025-30373  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade org.graylog2:graylog2-server to version 6.1.9 or higher.

Overview

org.graylog2:graylog2-server is a log management platform.

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel in the channelRead0() function. An attacker can bypass authentication by sending HTTP requests without required Authorization headers or with incorrect values.

Workaround

This vulnerability can be avoided by enforcing authenticated pull-based inputs only, and disabling HTTP-based inputs.

References

CVSS Base Scores

version 4.0
version 3.1