Fluentd Fluentd

Do you want an email whenever new security vulnerabilities are reported in Fluentd?

By the Year

In 2024 there have been 0 vulnerabilities in Fluentd . Last year Fluentd had 1 security vulnerability published. Right now, Fluentd is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 8.80
2022 1 9.80
2021 1 7.50
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Fluentd vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Fluentd Security Vulnerabilities

An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2

CVE-2020-21514 8.8 - High - April 04, 2023

An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password.

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on

CVE-2022-39379 9.8 - Critical - November 02, 2022

Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.

Marshaling, Unmarshaling

Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure

CVE-2021-41186 7.5 - High - October 29, 2021

Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).

Resource Exhaustion

Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may

CVE-2017-10906 9.8 - Critical - December 08, 2017

Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Openstack or by Fluentd? Click the Watch button to subscribe.

Fluentd
Vendor

Fluentd
Product

subscribe