HomeCII/OTSerious Vulnerability Enables DoS, RCE, and Data Leaks in Top Cloud Platforms

Serious Vulnerability Enables DoS, RCE, and Data Leaks in Top Cloud Platforms

Published on

spot_img

A newly discovered memory corruption vulnerability has been identified within a widely used cloud logging utility known as Fluent Bit, which is utilized across major cloud platforms. Fluent Bit is an open-source tool designed for collecting, processing, and forwarding logs and various types of application data. With over 3 billion downloads and approximately 10 million new deployments daily as of 2022, Fluent Bit has become a cornerstone in the software landscape. Major organizations including VMware, Cisco, Adobe, Walmart, LinkedIn, and leading cloud service providers such as AWS, Microsoft, and Google Cloud all rely on Fluent Bit for their logging needs.

The vulnerability within Fluent Bit has been named “Linguistic Lumberjack” in a recent report released by Tenable. This vulnerability is centered around how the service’s embedded HTTP server handles trace requests. When manipulated, this vulnerability can lead to denial of service (DoS), data leakage, or even remote code execution (RCE) within a cloud environment.

Jimi Sebree, a senior staff research engineer at Tenable, emphasized the importance of scrutinizing the underlying technologies that form the backbone of major cloud services. These common components, such as Fluent Bit, play a critical role in the overall security and functionality of cloud ecosystems. Identifying and addressing vulnerabilities in these foundational pieces of software is essential for maintaining the security of cloud infrastructure.

Tenable researchers uncovered the vulnerability in Fluent Bit while investigating a separate security issue within a cloud service. They observed unauthorized access to the cloud service provider’s internal metrics and logging endpoints, including instances of Fluent Bit. Data leakage from Fluent Bit’s monitoring API initially raised concerns, but further testing revealed a more serious issue.

The vulnerability in question involves improper validation of input data for a specific endpoint (/api/v1/traces) within Fluent Bit. By passing non-string values, an attacker can trigger memory corruption issues within the software. Through testing various integer values, researchers were able to crash the service and potentially expose sensitive data. Exploiting this vulnerability could also grant attackers remote code execution capabilities in a targeted environment, though developing a custom exploit for this purpose would require significant effort.

The affected versions of Fluent Bit range from 2.0.7 to 3.0.3, and the vulnerability is tracked under CVE-2024-4323. It has been categorized as “critical” by various sources, with CVSS scores exceeding 9.5 out of 10. Following the report of the vulnerability on April 30, the maintainers of Fluent Bit released an update to address the issue. This update, which validates data types in the problematic endpoint’s input field, was implemented on the project’s main branch on GitHub on May 15.

Organizations that have deployed Fluent Bit in their infrastructure are strongly encouraged to update to the latest version promptly. Alternatively, administrators can review and adjust configurations related to Fluent Bit’s monitoring API to limit access to authorized users and services, or restrict access altogether. Taking these steps can help mitigate the risk posed by the Linguistic Lumberjack vulnerability and enhance the overall security of cloud logging operations.

Source link

Latest articles

Half of US CISOs Work the Equivalent of a Six-Day Week

Cybersecurity Leaders Face Mounting Challenges Amidst Escalating Threats In the rapidly evolving landscape of cybersecurity,...

Open-Source CyberStrikeAI Used in AI-Driven FortiGate Attacks Across 55 Countries

The increasing threat posed by cyberattacks has recently gained attention due to the revelation...

Coruna: Advanced iOS Exploit Kit Fueling Financial Crime

A significant development in cybersecurity has emerged, revealing that a sophisticated iOS exploit kit...

Talion Expands Governance-Aligned Agentic SOC Amid Growing Board Cyber Scrutiny

Talion Expands Governance-Aligned Agentic SOC Amid Rising Cyber Risk Scrutiny Overview of Talion's Strategic Direction Talion,...

More like this

Half of US CISOs Work the Equivalent of a Six-Day Week

Cybersecurity Leaders Face Mounting Challenges Amidst Escalating Threats In the rapidly evolving landscape of cybersecurity,...

Open-Source CyberStrikeAI Used in AI-Driven FortiGate Attacks Across 55 Countries

The increasing threat posed by cyberattacks has recently gained attention due to the revelation...

Coruna: Advanced iOS Exploit Kit Fueling Financial Crime

A significant development in cybersecurity has emerged, revealing that a sophisticated iOS exploit kit...