|
{ |
|
"schema_version": "1.4.0", |
|
"id": "GHSA-2q4p-f6gf-mqr5", |
|
"modified": "2023-08-31T18:52:56Z", |
|
"published": "2023-07-06T20:53:15Z", |
|
"aliases": [ |
|
"CVE-2023-41044" |
|
], |
|
"summary": "Graylog server has partial path traversal vulnerability in Support Bundle feature", |
|
"details": "A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.\n\nThanks to weiweiwei9811 for reporting this vulnerability and providing detailed information.\n\n### Impact\n\nGraylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory.\n\nThe default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`.\n\nDue to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name.\n\nThe vulnerability would allow the download or deletion of files in the following example directories.\n\n- `/var/lib/graylog-server/support-bundle-test`\n- `/var/lib/graylog-server/support-bundlesdirectory`\n\nFor the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default.\n\n### Patches\n\nThe vulnerability is fixed in Graylog version 5.1.3 and later.\n\n### Workarounds\n\n\nBlock all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog.\n\n- `GET /api/system/debug/support/bundle/download/{filename}`\n- `DELETE /api/system/debug/support/bundle/{filename}`\n", |
|
"severity": [ |
|
{ |
|
"type": "CVSS_V3", |
|
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" |
|
} |
|
], |
|
"affected": [ |
|
{ |
|
"package": { |
|
"ecosystem": "Maven", |
|
"name": "org.graylog2:graylog2-server" |
|
}, |
|
"ranges": [ |
|
{ |
|
"type": "ECOSYSTEM", |
|
"events": [ |
|
{ |
|
"introduced": "5.1.0" |
|
}, |
|
{ |
|
"fixed": "5.1.3" |
|
} |
|
] |
|
} |
|
] |
|
} |
|
], |
|
"references": [ |
|
{ |
|
"type": "WEB", |
|
"url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5" |
|
}, |
|
{ |
|
"type": "ADVISORY", |
|
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044" |
|
}, |
|
{ |
|
"type": "WEB", |
|
"url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938" |
|
}, |
|
{ |
|
"type": "PACKAGE", |
|
"url": "https://github.com/Graylog2/graylog2-server" |
|
}, |
|
{ |
|
"type": "WEB", |
|
"url": "https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm" |
|
} |
|
], |
|
"database_specific": { |
|
"cwe_ids": [ |
|
"CWE-22" |
|
], |
|
"severity": "LOW", |
|
"github_reviewed": true, |
|
"github_reviewed_at": "2023-07-06T20:53:15Z", |
|
"nvd_published_at": "2023-08-31T18:15:09Z" |
|
} |
|
} |