The td-agent-builder plugin before 2020-12-18 for Fluentd allows attackers to gain privileges because the bin directory is writable by a user account, but a file in bin is executed as NT AUTHORITY\SYSTEM.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html | Exploit Third Party Advisory VDB Entry |
https://docs.fluentd.org/installation/install-by-msi | Product Vendor Advisory |
https://github.com/fluent-plugins-nursery/td-agent-builder/pull/247/commits/6f9cb6393392d62caa99907c0ebbcbab6b94a3f1 | Patch Third Party Advisory |
https://github.com/fluent/fluentd/issues/3201 | Exploit Issue Tracking Third Party Advisory |
https://github.com/kenhys/td-agent-builder/commit/eec6e2dedf12f2e0c01c2bbe7b8c15b639b3b938 | Patch Third Party Advisory |
https://td-agent-package-browser.herokuapp.com/4/windows | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4949 | Third Party Advisory |
https://www.fluentd.org/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-12-24 15:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-28169
Mitre link : CVE-2020-28169
CVE.ORG link : CVE-2020-28169
JSON object : View
Products Affected
td-agent-builder_project
- td-agent-builder
microsoft
- windows
debian
- debian_linux
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource