{"vulnerability": "CVE-2024-4323", "sightings": [{"uuid": "42083a03-79da-40bf-afc4-90724d9deaf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "Telegram/h3cIwbF32PHKUPGrNU5b5UL6CE5LYnTEyeBCzMh5kCkr6VQ", "content": "", "creation_timestamp": "2024-05-21T10:00:49.000000Z"}, {"uuid": "4e56c528-aa49-4081-a342-e324b07f6d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3m6h4auy5672r", "content": "", "creation_timestamp": "2025-11-25T10:15:05.840181Z"}, {"uuid": "1a0e8cb6-2db8-4e8a-a1b4-40a309e7bd63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7353", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.\nURL\uff1ahttps://github.com/skilfoy/CVE-2024-4323-Exploit-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-20T15:08:13.000000Z"}, {"uuid": "91762157-f36f-47f0-b3c7-ff31ed0e8cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/ap_security/556", "content": "#itnews #infosec\n\n\u26a1\ufe0f\u0428\u043f\u0438\u043e\u043d\u044b Shedding Zmiy \u043f\u0440\u043e\u043d\u0438\u043a\u043b\u0438 \u0432 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0413\u041a \u00ab\u0421\u043e\u043b\u0430\u0440\u00bb, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u0430\u044f \u043d\u0430 \u0448\u043f\u0438\u043e\u043d\u0430\u0436 APT-\u0433\u0440\u0443\u043f\u043f\u0430 \u0441 \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u043c \u0438\u043c\u0435\u043d\u0435\u043c Shedding Zmiy \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 \u0420\u043e\u0441\u0441\u0438\u0438 \u0432 2022 \u0433\u043e\u0434\u0443. \u041d\u0430 \u0435\u0435 \u0441\u0447\u0435\u0442\u0443 \u0443\u0436\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u0430\u0442\u0430\u043a \u043d\u0430 \u0433\u043e\u0441\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b, \u043f\u0440\u043e\u043c\u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f, \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u0441\u0435\u0442\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u0431\u044a\u0435\u043a\u0442\u044b \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0432\u0430\u0436\u043d\u043e\u0441\u0442\u0438. \u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432 \u0432 \u0445\u043e\u0434\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0431\u044d\u043a\u0434\u043e\u0440 CobInt, \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u0430\u0432\u0442\u043e\u0440 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a \u2014 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Cobalt (\u044d\u0442\u043e \u0435\u0435 \u00ab\u0444\u0438\u0440\u043c\u0435\u043d\u043d\u044b\u0439\u00bb \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442). \u041e\u0434\u043d\u0430\u043a\u043e \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u043e, \u0447\u0442\u043e \u044d\u0442\u043e \u043d\u0435 \u0442\u0430\u043a: \u0432\u0437\u043b\u043e\u043c\u0449\u0438\u043a\u0438 \u043d\u0435 \u0438\u0441\u043a\u0430\u043b\u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e\u0439 \u0432\u044b\u0433\u043e\u0434\u044b, \u043e\u043d\u0438 \u0432\u043e\u0440\u043e\u0432\u0430\u043b\u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u0441 \u0442\u0435\u043c, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u0432 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u043b\u0438 \u0441\u043b\u0438\u0442\u044c \u0432 Telegram. \u041e\u0431\u0448\u0438\u0440\u043d\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0438 \u0442\u0435\u0445\u043d\u0438\u043a \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 Shedding Zmiy \u043a\u0430\u0436\u0434\u044b\u0439 \u0440\u0430\u0437 \u043c\u0435\u043d\u044f\u0442\u044c \u0442\u0430\u043a\u0442\u0438\u043a\u0443\n\n\u26a0\ufe0f\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Fluent Bit \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0434\u043b\u044f AWS, Azure, Google Cloud\n\n\u0412 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 Fluent Bit \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0433\u0440\u043e\u0437\u044f\u0449\u0430\u044f \u043a\u0440\u0430\u0445\u043e\u043c \u0441\u043b\u0443\u0436\u0431\u044b, \u0441\u043b\u0438\u0432\u043e\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0434\u0430\u0436\u0435 RCE. \u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0436\u0435 \u0433\u043e\u0442\u043e\u0432\u044b, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u044b (Google, Amazon, Microsoft) \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u044c. \u041f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 \u043c\u0430\u0440\u0442, \u0435\u0435 \u0441\u0443\u043c\u043c\u0430\u0440\u043d\u043e \u0441\u043a\u0430\u0447\u0430\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 13 \u043c\u043b\u0440\u0434 \u0440\u0430\u0437; \u0442\u0430\u043a\u043e\u0439 \u0430\u0433\u0435\u043d\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u044b AWS, GCP \u0438 Azure. \u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-4323 (9,8 \u0431\u0430\u043b\u043b\u0430 CVSS, \u043f\u043e \u043e\u0446\u0435\u043d\u043a\u0435 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u043d\u0430\u0445\u043e\u0434\u043a\u0438) \u0431\u044b\u043b\u0430 \u043f\u0440\u0438\u0432\u043d\u0435\u0441\u0435\u043d\u0430 \u0432 Fluent Bit \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c \u0441\u0431\u043e\u0440\u043a\u0438 2.0.7. \u041e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u043f\u0440\u0438 \u043f\u0430\u0440\u0441\u0438\u043d\u0433\u0435 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c HTTP \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0443\n\n\ud83d\udd13Innostage \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 bug bounty \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u0438\u0441\u043f\u044b\u0442\u0430\u043d\u0438\u0439\n\n\u041d\u0430 \u0441\u0442\u0430\u0440\u0442\u043e\u0432\u0430\u0432\u0448\u0435\u043c \u0441\u0435\u0433\u043e\u0434\u043d\u044f Positive Hack Days 2 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Innostage \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u0433\u043e\u0442\u043e\u0432\u044f\u0449\u0435\u0439\u0441\u044f \u043a \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 \u043f\u043e \u043f\u043e\u0438\u0441\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0445 \u043a\u0438\u0431\u0435\u0440\u0438\u0441\u043f\u044b\u0442\u0430\u043d\u0438\u0439. \u0411\u0430\u0433-\u0431\u0430\u0443\u043d\u0442\u0438 \u0431\u0443\u0434\u0435\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Standoff Bug Bounty. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043d\u0435\u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u044b\u0435 \u0441\u043e\u0431\u044b\u0442\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u043e\u043a\u0430\u0436\u0443\u0442 \u0432\u043b\u0438\u044f\u043d\u0438\u0435 \u043d\u0430 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 \u0446\u0435\u043b\u043e\u043c \u043f\u0440\u043e\u0449\u0443\u043f\u0430\u0442\u044c \u043a\u0438\u0431\u0435\u0440\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u044c \u0418\u0422-\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u041f\u043e\u043c\u043e\u0447\u044c \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043a\u0438\u0431\u0435\u0440\u0438\u0441\u043f\u044b\u0442\u0430\u043d\u0438\u044f Innostage \u0432\u044b\u0437\u0432\u0430\u043b\u0438\u0441\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0410\u041e \u00ab\u041a\u0438\u0431\u0435\u0440\u0438\u0441\u043f\u044b\u0442\u0430\u043d\u0438\u044f\u00bb \u0438 Positive Technologies", "creation_timestamp": "2024-05-24T19:13:16.000000Z"}, {"uuid": "71973d66-6f3b-4c5b-915e-0e19d08900b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/4456", "content": "\u041f\u0440\u0438\u043c\u0435\u0440 \u0437\u0430\u043f\u0440\u043e\u0441\u0430, \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0449\u0435\u0433\u043e \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u0435:\n   python3 -c 'print(\"{\\\"output\\\":\\\"stdout\\\", \\\"params\\\": {\\\"format\\\": \\\"json\\\"},\\\"inputs\\\":[\\\"\" + \"A\"*8 + \"\\\",\" + str(0xffffffff) + \", \\\"\" + \"B\"*500 + \"\\\"]}\")' &gt; test\n   curl -v http://:2020/api/v1/traces/ -H \"Content-Type: application/json\" -H \"Expect: \" --data \"@test\"\n\u0412 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u044d\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u043e\u0432 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0433\u043e \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u044c \u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u043f\u0430\u043c\u044f\u0442\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0439 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0438 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0435\u0439, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u044b \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a \u043a\u043b\u044e\u0447\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u0422\u0430\u043a \u043a\u0430\u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0437\u0430\u0432\u0438\u0441\u044f\u0449\u0435\u043c\u0443 \u043e\u0442 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430, \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u043d\u043e \u0432\u044b\u044f\u0432\u0438\u0432\u0448\u0438\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u044d\u0442\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u043b\u0430\u0441\u044c \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430 \u0440\u0430\u0431\u043e\u0442\u0443 \u043d\u0430\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u043c.\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fluent Bit, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u043e\u0432\nhttps://www.opennet.me/opennews/art.shtml?num=61229\n\n\u041e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\nhttps://www.tenable.com/blog/linguistic-lumberjack-attacking-cloud-services-via-logging-endpoints-fluent-bit-cve-2024-4323", "creation_timestamp": "2024-05-22T11:11:09.000000Z"}, {"uuid": "93efcced-7c84-4d33-906e-9dfa8c99a4ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/1268", "content": "\ud83d\udd14 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fluent bit: DoS, \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0448\u0430\u043d\u0441 RCE\n\n\u041a\u043e\u043b\u043b\u0435\u043a\u0442\u043e\u0440 \u043b\u043e\u0433\u043e\u0432 Fluent bit, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 \u0432 \u043c\u043d\u043e\u0433\u0438\u0445 \u0432\u044b\u0441\u043e\u043a\u043e\u043d\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u0445 (\u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0432\u0441\u0435\u0445 \u0442\u043e\u043f\u043e\u0432\u044b\u0445 \u0438\u0433\u0440\u043e\u043a\u043e\u0432 \u0432 public cloud), \u0443\u044f\u0437\u0432\u0438\u043c \u043a \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u0430\u0442\u0430\u043a\u0435 (CVE-2024-4323, CVSS 9.8), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0435\u0439 \u043a \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 \u0443\u0442\u0435\u0447\u043a\u0435 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430 \u043f\u0430\u043c\u044f\u0442\u0438. \u0414\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043d\u0438\u0437\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 API-\u0437\u0430\u043f\u0440\u043e\u0441\u0443 /api/v1/trace.  \u0410\u0432\u0442\u043e\u0440\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0445\u043e\u0442\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0432\u0438\u0434\u0435 RCE \u0435\u0441\u0442\u044c, \u043d\u0430\u0434\u0451\u0436\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u044d\u0442\u043e\u0433\u043e \u043d\u0430\u043f\u0438\u0441\u0430\u0442\u044c \u043d\u0435\u043b\u0435\u0433\u043a\u043e. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0435 PoC, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043e\u0441\u0442\u0440\u043e\u0442\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u0440\u0430\u0441\u0442\u0438 \u0432 \u043b\u044e\u0431\u043e\u0439 \u043c\u043e\u043c\u0435\u043d\u0442.\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u0436\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0438\u0437 \u044d\u0442\u043e\u0433\u043e PR \u043d\u0430 Github, \u043b\u0438\u0431\u043e \u0434\u043e\u0436\u0434\u0430\u0442\u044c\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0435\u0440\u0441\u0438\u0438, \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 Fluent bit. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 API \u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a Fluent bit \u0443\u0437\u043a\u0438\u043c \u043a\u0440\u0443\u0433\u043e\u043c \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u043a\u043e\u0432 \u0441\u0442\u043e\u0438\u0442 \u0438\u0437\u0443\u0447\u0438\u0442\u044c \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b \u0441\u0442\u0430\u0442\u0443\u0441\u0430 \u0443 \u0441\u0432\u043e\u0435\u0433\u043e \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 \u0438\u043b\u0438 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c\u0441\u044f \u0432 \u0442\u0435\u0445\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443, \u0447\u0442\u043e\u0431\u044b \u0443\u0442\u043e\u0447\u043d\u0438\u0442\u044c \u0441\u0442\u0430\u0442\u0443\u0441 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #CVE @\u041f2\u0422", "creation_timestamp": "2024-05-22T08:55:02.000000Z"}, {"uuid": "37322293-3a4c-4092-a2df-e7beac844138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43234", "type": "seen", "source": "https://t.me/cvedetector/13012", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43234 - Envato Security Team Woffice Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-43234 \nPublished : Dec. 16, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : Authentication Bypass Using an Alternate Path or Channel vulnerability in Envato Security Team Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T18:11:15.000000Z"}, {"uuid": "cb8615ef-1d55-49e8-b7a6-1f564dd6de94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43238", "type": "seen", "source": "https://t.me/cvedetector/3460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43238 - weMail Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-43238 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs weMail allows Reflected XSS.This issue affects weMail: from n/a through 1.14.5. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:28.000000Z"}, {"uuid": "dc293ab7-49c2-4278-86a7-d25a3fba76ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43237", "type": "seen", "source": "https://t.me/cvedetector/6320", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43237 - TaxoPress WordPress Tag Cloud Plugin - Tag Groups Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-43237 \nPublished : Sept. 25, 2024, 3:15 p.m. | 22\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in TaxoPress WordPress Tag Cloud Plugin \u2013 Tag Groups.This issue affects WordPress Tag Cloud Plugin \u2013 Tag Groups: from n/a through 2.0.3. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-25T17:41:07.000000Z"}, {"uuid": "663f81b3-be7f-41ae-9c5e-422e1124976a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/730", "content": "\u200aLinguistic Lumberjack (CVE-2024-4323): Critical Vulnerability Shakes Cloud Logging Infrastructure\n\nhttps://securityonline.info/linguistic-lumberjack-cve-2024-4323-critical-vulnerability-shakes-cloud-logging-infrastructure/", "creation_timestamp": "2024-05-21T15:30:05.000000Z"}, {"uuid": "367926ef-0bee-4b27-8cd4-b1ce9b99b1ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43231", "type": "seen", "source": "https://t.me/cvedetector/2903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43231 - Themeum Tutor LMS Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-43231 \nPublished : Aug. 12, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themeum Tutor LMS allows Stored XSS.This issue affects Tutor LMS: from n/a through 2.7.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T00:22:03.000000Z"}, {"uuid": "ec3913a5-aa63-464a-9646-e57bb897cd11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43233", "type": "seen", "source": "https://t.me/cvedetector/2899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43233 - BannerSky BSK Forms Blacklist Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-43233 \nPublished : Aug. 12, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BannerSky BSK Forms Blacklist allows Reflected XSS.This issue affects BSK Forms Blacklist: from n/a through 3.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T00:21:57.000000Z"}, {"uuid": "eb1ed60e-91ee-4dd0-8a77-009132bf11b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43232", "type": "seen", "source": "https://t.me/cvedetector/3530", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43232 - WP OnlineSupport Essential Plugin Timeline Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43232 \nPublished : Aug. 19, 2024, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP OnlineSupport, Essential Plugin Timeline and History slider allows PHP Local File Inclusion.This issue affects Timeline and History slider: from n/a through 2.3. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T20:12:28.000000Z"}, {"uuid": "fd833a8b-d6c2-4881-b31c-79a13ca0c813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43236", "type": "seen", "source": "https://t.me/cvedetector/3528", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43236 - Scott Paterson Easy PayPal Buy Now Button Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43236 \nPublished : Aug. 19, 2024, 5:15 p.m. | 40\u00a0minutes ago \nDescription : URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Paterson Easy PayPal Buy Now Button.This issue affects Easy PayPal Buy Now Button: from n/a through 1.9. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T20:12:26.000000Z"}, {"uuid": "63aaf343-92a2-437a-b14b-045c4457adf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "Telegram/U5V26QB-gaNI6kLT4BjOK5wFsTkBvyGrSrD6EN0FHVCUgg", "content": "", "creation_timestamp": "2024-05-21T11:52:43.000000Z"}, {"uuid": "424f88dc-2d7b-4020-8d99-59b59653abb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/8170", "content": "The Hacker News\n\"Linguistic Lumberjack\" Vulnerability Discovered in Popular Logging Utility Fluent Bit\n\nCybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote code execution.\nThe&nbsp;vulnerability,&nbsp;tracked as&nbsp;CVE-2024-4323, has been codenamed Linguistic Lumberjack by Tenable Research. It impacts versions from 2.0.7 through", "creation_timestamp": "2024-05-21T11:52:43.000000Z"}, {"uuid": "900beb00-edb9-4503-a7e4-20eea35fed52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "Telegram/syNQSFmdpcV-EjHc08rmPo6svl_Jg9CNBl6M3FEe5sh0kw", "content": "", "creation_timestamp": "2024-05-21T09:59:21.000000Z"}, {"uuid": "cdc59610-f500-4a61-b7cf-7e0ad1e30602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1516", "content": "The Hacker News\n\"Linguistic Lumberjack\" Vulnerability Discovered in Popular Logging Utility Fluent Bit\n\nCybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote code execution.\nThe&nbsp;vulnerability,&nbsp;tracked as&nbsp;CVE-2024-4323, has been codenamed Linguistic Lumberjack by Tenable Research. It impacts versions from 2.0.7 through", "creation_timestamp": "2024-05-21T11:52:43.000000Z"}, {"uuid": "e57c5643-8ceb-4f5b-b306-036b240787f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/information_security_channel/52225", "content": "Vulnerability Found in Fluent Bit Utility Used by Major Cloud, Tech Companies\nhttps://www.securityweek.com/vulnerability-found-in-fluent-bit-utility-used-by-major-cloud-tech-companies/\n\nLinguistic Lumberjack (CVE-2024-4323) is a critical vulnerability in the Fluent Bit logging utility\u00a0that can allow DoS, information disclosure and possibly RCE.\nThe post Vulnerability Found in Fluent Bit Utility Used by Major Cloud, Tech Companies (https://www.securityweek.com/vulnerability-found-in-fluent-bit-utility-used-by-major-cloud-tech-companies/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-05-20T19:24:55.000000Z"}, {"uuid": "56d1f7d9-9940-47de-82df-95553e470cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/KomunitiSiber/1970", "content": "\"Linguistic Lumberjack\" Vulnerability Discovered in Popular Logging Utility Fluent Bit\nhttps://thehackernews.com/2024/05/linguistic-lumberjack-vulnerability.html\n\nCybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote code execution.\nThe\u00a0vulnerability,\u00a0tracked as\u00a0CVE-2024-4323, has been codenamed Linguistic Lumberjack by Tenable Research. It impacts versions from 2.0.7 through", "creation_timestamp": "2024-05-21T09:53:15.000000Z"}, {"uuid": "35330195-0788-4849-8acf-e35b82ec420b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "Telegram/WWoJhpJ5HmVUzPfG-0vq8u0cx5gdaVqxWZC4NtgBXRR8M-E", "content": "", "creation_timestamp": "2024-05-21T18:59:40.000000Z"}, {"uuid": "8353fd2f-4161-4569-bf00-3d91beeb5e64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/true_secator/5758", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Tenable \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Fluent Bit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0441\u0435\u0445 \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u043e\u0432.\n\nFluent Bit - \u044d\u0442\u043e \u0447\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0438 \u043c\u0435\u0442\u0440\u0438\u043a \u0434\u043b\u044f Windows, Linux \u0438 macOS, \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0435 \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Kubernetes, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043e\u0442 Amazon AWS, Google GCP \u0438 Microsoft Azure.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0435 \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 \u043c\u0430\u0440\u0442 2024, Fluent Bit \u0431\u044b\u043b \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u00a0\u0431\u043e\u043b\u0435\u0435 13 \u043c\u0438\u043b\u043b\u0438\u0430\u0440\u0434\u043e\u0432 \u0440\u0430\u0437 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0447\u0438\u0445 \u0438\u043d\u0444\u043e\u0441\u0435\u043a-\u0432\u0435\u043d\u0434\u043e\u0440\u0430\u043c\u0438 Crowdstrike \u0438 Trend Micro, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u043c\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Cisco, VMware, Intel, Adobe \u0438 Dell.\n\n\u041f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u00a0Linguistic Lumberjack \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a\u00a0CVE-2024-4323, \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 2.0.7 \u0438 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u043f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0442\u0440\u0430\u0441\u0441\u0438\u0440\u043e\u0432\u043a\u0438 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c HTTP-\u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c Fluent Bit.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043b\u0435\u0433\u043a\u043e \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 DoS \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0442\u0430\u043a\u0436\u0435 \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f RCE (\u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u0439 \u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430).\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 DoS \u0438 \u0443\u0442\u0435\u0447\u043a\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\nTenable \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430 \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 30 \u0430\u043f\u0440\u0435\u043b\u044f, \u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u0432\u043d\u0435\u0441\u0435\u043d\u044b \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u0443\u044e \u0432\u0435\u0442\u043a\u0443 Fluent Bit \u0443\u0436\u0435 15 \u043c\u0430\u044f. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0438 \u0441 \u043f\u0430\u0442\u0447\u0435\u043c \u0431\u0443\u0434\u0443\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0441 Fluent Bit 3.0.4 (\u043f\u0430\u043a\u0435\u0442\u044b Linux \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0437\u0434\u0435\u0441\u044c). \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043b\u0438 Microsoft, Amazon \u0438 Google.\n\n\u0412 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0441\u043c\u044f\u0433\u0447\u0438\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432 \u0434\u043e\u0441\u0442\u0443\u043f \u043a API \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 Fluent Bit \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0438 \u0441\u043b\u0443\u0436\u0431\u0430\u043c. \u041b\u0438\u0431\u043e \u0432\u043e\u0432\u0441\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 API.", "creation_timestamp": "2024-05-21T15:40:05.000000Z"}, {"uuid": "574aeaae-bbc3-4d96-847e-da16d0d45cdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2571", "content": "https://www.tenable.com/blog/linguistic-lumberjack-attacking-cloud-services-via-logging-endpoints-fluent-bit-cve-2024-4323\n\nLinguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)\n#\u5206\u6790", "creation_timestamp": "2024-06-01T06:30:09.000000Z"}, {"uuid": "d4ac9fd0-33c9-40e7-9c17-83b3fdbb4b91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/thehackernews/4982", "content": "\ud83d\udea8 Critical security vulnerability discovered in Fluent Bit, a widely used logging and metrics utility. \n \nNicknamed \"Linguistic Lumberjack,\" it could lead to DoS, information disclosure, or even RCE attacks. \n \nLearn more about CVE-2024-4323: https://thehackernews.com/2024/05/linguistic-lumberjack-vulnerability.html", "creation_timestamp": "2024-05-21T08:50:20.000000Z"}, {"uuid": "8b45eae1-4544-41b6-8c05-4cda4c654988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4323", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10543", "content": "#Threat_Research\n1. Injection Deep-Dive CVE-2023-23992\nhttps://www.horizon3.ai/attack-research/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive\n2. Linguistic Lumberjack: Fluent Bit Vulnerability CVE-2024-4323\nhttps://www.tenable.com/blog/linguistic-lumberjack-attacking-cloud-services-via-logging-endpoints-fluent-bit-cve-2024-4323", "creation_timestamp": "2024-05-21T19:44:21.000000Z"}]}