{ "schema_version": "1.4.0", "id": "GHSA-2q4p-f6gf-mqr5", "modified": "2023-08-31T18:52:56Z", "published": "2023-07-06T20:53:15Z", "aliases": [ "CVE-2023-41044" ], "summary": "Graylog server has partial path traversal vulnerability in Support Bundle feature", "details": "A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.\n\nThanks to weiweiwei9811 for reporting this vulnerability and providing detailed information.\n\n### Impact\n\nGraylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory.\n\nThe default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `/support-bundle`.\n\nDue to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name.\n\nThe vulnerability would allow the download or deletion of files in the following example directories.\n\n- `/var/lib/graylog-server/support-bundle-test`\n- `/var/lib/graylog-server/support-bundlesdirectory`\n\nFor the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default.\n\n### Patches\n\nThe vulnerability is fixed in Graylog version 5.1.3 and later.\n\n### Workarounds\n\n\nBlock all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog.\n\n- `GET /api/system/debug/support/bundle/download/{filename}`\n- `DELETE /api/system/debug/support/bundle/{filename}`\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "org.graylog2:graylog2-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.1.0" }, { "fixed": "5.1.3" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41044" }, { "type": "WEB", "url": "https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938" }, { "type": "PACKAGE", "url": "https://github.com/Graylog2/graylog2-server" }, { "type": "WEB", "url": "https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2023-07-06T20:53:15Z", "nvd_published_at": "2023-08-31T18:15:09Z" } }