5
CVSSv2

CVE-2021-41186

Published: 29/10/2021 Updated: 03/11/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fluentd fluentd

Vendor Advisories

Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure The parser_apache2 plugin in Fluentd v01414 to v1141 suffers from a regular expression denial of service (ReDoS) vulnerability A broken apache log with a certain pattern of string can spend too much time in a regular expression, res ...