{"id":"CVE-2022-39379","summary":"Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)","details":"Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.","aliases":["BIT-fluentd-2022-39379","GHSA-fppq-mj76-fpj2"],"modified":"2026-04-02T08:10:05.391863Z","published":"2022-11-02T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39379.json","cwe_ids":["CWE-502"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39379.json"},{"type":"ADVISORY","url":"https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYD5QV66OLDHES6IKVYYM3Y3YID3VVCO/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39379"},{"type":"FIX","url":"https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluent/fluentd","events":[{"introduced":"f73c601ecf822a0b38f2c898db6b0da87305925d"},{"fixed":"e89092ce1132a933c12bb23fe8c9323c07ca81f5"}]}],"versions":["v1.13.2","v1.13.3","v1.14.0","v1.14.0.rc","v1.14.1","v1.14.2","v1.14.3","v1.14.4","v1.14.5","v1.14.6","v1.15.0","v1.15.1","v1.15.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39379.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}