Fluent Bit has been found to have a vulnerability called “Linguistic Lumberjack”.

SHARE

A crucial vulnerability has been identified by cybersecurity experts in Fluent Bit, a commonly used logging and metrics tool. This flaw could enable perpetrators to carry out denial-of-service (DoS) attacks, gather sensitive information or execute remote code.

Credits:coralogix

Tenable Research has assigned the moniker Linguistic Lumberjack to a vulnerability with tracking reference CVE-2024-4323. This flaw affects versions 2.0.7 through 3.0.3 but is remedied in version 3,0,4 onwards.

Fluent Bit’s built-in HTTP server has a memory corruption problem that could lead to DoS, information leakage, or remote code execution.

This pertains to the act of sending intentionally manipulated requests via endpoints like /api/v1/traces and /api/v1/trace towards the monitoring API.

Jimi Sebree, a security researcher, stated that even if there are no traces set up, any user who has access to this API endpoint can still inquire about it.

Before parsing, proper validation of the data types for input names is not performed during incoming requests to /api/v1/traces endpoint.

Credits:thehackersnews

Assuming data types as strings (MSGPACK_OBJECT_STR) by default poses a risk of memory corruption if an attacker supplies non-string values.

According to Tenable, they were able to consistently exploit the issue leading to a service crash and resulting in a DoS scenario. However, remote code execution is contingent upon several environmental elements such as host architecture and operating.

It is advised that users update to the most recent version as a precautionary measure against possible security risks, particularly since an exploit for the flaw has been made accessible in proof-of-concept (PoC) form.


SHARE

79 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *