The td-agent-builder plugin before 2020-12-18 for Fluentd allows attackers to gain privileges because the bin directory is writable by a user account, but a file in bin is executed as NT AUTHORITY\SYSTEM.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://docs.fluentd.org/installation/install-by-msi | product vendor advisory |
https://td-agent-package-browser.herokuapp.com/4/windows | third party advisory |
https://www.fluentd.org/ | vendor advisory |
https://github.com/kenhys/td-agent-builder/commit/eec6e2dedf12f2e0c01c2bbe7b8c15b639b3b938 | third party advisory patch |
https://github.com/fluent/fluentd/issues/3201 | issue tracking exploit third party advisory |
https://github.com/fluent-plugins-nursery/td-agent-builder/pull/247/commits/6f9cb6393392d62caa99907c0ebbcbab6b94a3f1 | third party advisory patch |
http://packetstormsecurity.com/files/160791/Fluentd-TD-agent-4.0.1-Insecure-Folder-Permission.html | exploit vdb entry third party advisory |
https://www.debian.org/security/2021/dsa-4949 | third party advisory vendor advisory |