Fluent Bit, a widely used open-source data collector and processor, has been found to have a major memory loss flaw.
Many big cloud providers use Fluent Bit for their logging because it is easy to use and can be scaled up or down as needed.
Tenable Research found the flaw, which affects Fluent Bit’s built-in HTTP server and has been designated CVE-2024-4323.
This bug could cause a denial of service (DoS), the loss of information, or the execution of code from afar (RCE).
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
A security flaw in a cloud service was being looked into when the weakness was found.
Researchers discovered they could access several metrics and logging URLs, such as several Fluent Bit instances.
The problem happens because the data types in the “inputs” array of calls to the /api/v1/traces endpoint are not correctly checked.
It can damage memory by sending numbers that aren’t strings, like integers.
This could cause the program to crash, send too much data to the heap, or lose data.
There are a few ways to take advantage of the memory corruption bug in Fluent Bit’s tracking API:
The experts used this flaw in the lab to crash the service and set off a denial-of-service event.
They could also get back pieces of memory next to each other, which sometimes revealed parts of secrets and could mean that information was getting out.
Fluent Bit’s developers were notified of the problem on April 30, 2024, and a fix was added to the project’s main branch on May 15, 2024.
The fix includes ensuring the data types in the “inputs” array are correct.
It is suggested that users update to the newest version (3.0.4) as soon as it comes out.
If you can’t upgrade, you should look at Fluent Bit’s monitoring API and make sure that only approved users can access it.
The above debugger output indicates a heap-buffer overflow, but ultimately, the crash is caused by an attempt to write to a protected memory region.
If you depend on cloud services that use Fluent Bit, you should contact the cloud source to ensure you get any updates or fixes as soon as possible.
Big cloud service companies like Microsoft, Amazon, and Google have been told about the problem.
The discovery of CVE-2024-4323 shows the importance of logging and monitoring tools to get regular updates and strict security measures.
Businesses need to use defense-in-depth strategies and the concept of least privilege to prevent attackers from abusing their power.
Since logging infrastructure is an important part of both cloud-based and on-premises settings, fixing these problems immediately is necessary to maintain security.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian…
IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system…
The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache…
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage…
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…