Security

Research

Critical Fluent Bit bug affects all major cloud providers, say researchers

Crashes galore, plus especially crafty crims could use it for much worse


Infosec researchers are alerting the industry to a critical vulnerability in Fluent Bit – a logging component used by a swathe of blue chip companies and all three major cloud providers.

Experts at Tenable discovered the flaw (CVE-2024-4323), which can lead to denial of service (DoS) and information leakage, and under the right conditions remote code execution (RCE).

Fluent Bit is an open source logging component with more than 13 million Docker downloads as of March. It's used by the likes of the big three CSPs, Cisco, Dell, Walmart, Lyft, LinkedIn, and more.

Tenable discovered CVE-2024-4323, affecting versions 2.0.7 through 3.0.3, while investigating a separate, as-yet-undisclosed vuln in a cloud service. Researchers found that if they passed non-string values into requests to Fluent Bit's monitoring API, which allows users to gather info such as uptime data and plugin metrics, it led to various memory corruption issues.

Examples include:

The researchers says they were able to reliably achieve DoS using the vulnerability, and access chunks of adjacent memory including partial secrets, which suggests sensitive information could potentially be leaked. That said, in most scenarios it's unlikely to reveal anything more than previous metrics requests, blogged Jimi Sebree, senior staff research engineer at Tenable.

"As for the remote code execution possibilities of this issue, exploitation is dependent on a variety of environmental factors such as host architecture and operating system," he added. 

"While heap buffer overflows such as this are known to be exploitable, creating a reliable exploit is not only difficult, but incredibly time-intensive. The researchers believe that the most immediate and primary risks are those pertaining to the ease with which DoS and information leaks can be accomplished."

In its writeup, Tenable published a short proof of concept endpoint request that would lead to a crash, but didn't provide examples of how to reveal partial secrets or achieve RCE.

Cloud providers that depend on Fluent Bit are advised to upgrade to version 3.0.4, or at the very least limit access to the vulnerable endpoints (/api/v1/traces and /api/v1/trace). Disabling it also works.

"If you rely on cloud services that are known to make use of Fluent Bit, we recommend reaching out to your cloud provider to ensure that updates or mitigations are deployed in a timely manner," said Sebree.

"With regards to usage by major cloud providers, Tenable notified Microsoft, Amazon, and Google of this issue via their respective vulnerability disclosure mechanisms on May 15, 2024, so that they could begin their internal triage processes." ®

Send us news
2 Comments

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

CockroachDB scurries off to proprietary software land

As VC-owned fauxpen source biz yells 'show me the money,' more may follow to the peril of the community

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

CockroachDB scuttles away from open source Core offering

Distributed database biz doesn't like bigger customers using the free version of its software

Double Debian update: 11.11 and 12.7 arrive at once

But Bullseye's days are numbered and it's time to think about upgrading

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

GNU screen 5 proves it's still got game even after 37 years

First major version in two decades is worth getting to know

Brace for glitches and GRUB grumbles as Ubuntu 24.04.1 lands

Now the Numbat has been neatened, you can replace your Jellyfish – if you dare

Alibaba Cloud boosts failure prediction with logfile timestamps

Machine learning helps, but more data catches more faults - so Chinese champ has shared its data