The td-agent-builder plugin before 2020-12-18 for Fluentd allows attackers to gain privileges because the bin directory is writable by a user account, but a file in bin is executed as NT AUTHORITY\SYSTEM.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html | Exploit Third Party Advisory VDB Entry |
https://docs.fluentd.org/installation/install-by-msi | Product Vendor Advisory |
https://github.com/fluent-plugins-nursery/td-agent-builder/pull/247/commits/6f9cb6393392d62caa99907c0ebbcbab6b94a3f1 | Patch Third Party Advisory |
https://github.com/fluent/fluentd/issues/3201 | Exploit Issue Tracking Third Party Advisory |
https://github.com/kenhys/td-agent-builder/commit/eec6e2dedf12f2e0c01c2bbe7b8c15b639b3b938 | Patch Third Party Advisory |
https://td-agent-package-browser.herokuapp.com/4/windows | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4949 | Third Party Advisory |
https://www.fluentd.org/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-24T14:36:09
Updated: 2021-08-05T11:06:21
Reserved: 2020-11-02T00:00:00
Link: CVE-2020-28169
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-24T15:15:12.950
Modified: 2022-04-05T16:04:54.263
Link: CVE-2020-28169
JSON object: View
Redhat Information
No data.
CWE