
Cloud Vulnerability DB
A community-led vulnerabilities database
A remote code execution (RCE) vulnerability identified as CVE-2022-39379 was discovered in Fluentd, affecting versions 1.13.2 through 1.15.3. The vulnerability was disclosed on November 2, 2022, and specifically impacts non-default configurations of Fluentd when the FLUENTOJOPTION_MODE environment variable is explicitly set to 'object' (GitHub Advisory, NIST NVD).
The vulnerability stems from Fluentd's use of Oj as its JSON parser when installed. When Oj.load is used in object-mode, it allows the deserialization of arbitrary Ruby objects, which can lead to remote code execution. The vulnerability was introduced in version 1.13.2 when the FLUENTOJOPTIONMODE configuration option was added. The issue is tracked as CWE-502 (Deserialization of Untrusted Data) ([GitHub Security Lab](https://securitylab.github.com/advisories/GHSL-2022-067Fluentd/)).
When exploited, this vulnerability allows unauthenticated attackers to execute arbitrary code on the affected system through specially crafted JSON payloads. The impact is particularly severe as it enables remote code execution capabilities, though it's mitigated by the fact that it only affects non-default configurations (GitHub Advisory).
The vulnerability was patched in Fluentd version 1.15.3 by removing the 'object' option from the available list of FLUENTOJOPTIONMODE values. For users unable to upgrade immediately, the recommended workaround is to avoid using FLUENTOJOPTIONMODE=object in their configuration (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."