Improper Neutralization Affecting fluentd package, versions >=0.12.29, <0.12.41
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-FLUENTD-3247467
- published 25 Jan 2023
- disclosed 13 May 2022
- credit Teppei Fukuda
Introduced: 13 May 2022
CVE-2017-10906 Open this link in a new tabHow to fix?
Upgrade fluentd
to version 0.12.41 or higher.
Overview
Affected versions of this package are vulnerable to Improper Neutralization via the filter_parser.rb:filter_stream
function. Exploiting this vulnerability may allow an attacker to change the terminal UI or execute arbitrary commands on the victim's device via unspecified vectors.
NOTE: A vulnerable system requires all of the following conditions to be existing:
A
filter_parser
enabled influentd.conf
Fluentd is running in non-daemon mode or a bad
Syslog
server that doesn't sanitize escape sequences (rsyslog
does)A vulnerable terminal that happens to be running
fluentd
or manipulating thefluentd
log file.