Vulnerability Details CVE-2021-41186
Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.3%
CVSS Severity
CVSS v3 Score 5.9
CVSS v2 Score 5.0
Products affected by CVE-2021-41186
-
cpe:2.3:a:fluentd:fluentd:0.14.14
-
cpe:2.3:a:fluentd:fluentd:0.14.15
-
cpe:2.3:a:fluentd:fluentd:0.14.16
-
cpe:2.3:a:fluentd:fluentd:0.14.17
-
cpe:2.3:a:fluentd:fluentd:0.14.18
-
cpe:2.3:a:fluentd:fluentd:0.14.19
-
cpe:2.3:a:fluentd:fluentd:0.14.20
-
cpe:2.3:a:fluentd:fluentd:0.14.21
-
cpe:2.3:a:fluentd:fluentd:0.14.22
-
cpe:2.3:a:fluentd:fluentd:0.14.23
-
cpe:2.3:a:fluentd:fluentd:0.14.24
-
cpe:2.3:a:fluentd:fluentd:0.14.25
-
cpe:2.3:a:fluentd:fluentd:1.0.0
-
cpe:2.3:a:fluentd:fluentd:1.0.1
-
cpe:2.3:a:fluentd:fluentd:1.0.2
-
cpe:2.3:a:fluentd:fluentd:1.1.0
-
cpe:2.3:a:fluentd:fluentd:1.1.1
-
cpe:2.3:a:fluentd:fluentd:1.1.2
-
cpe:2.3:a:fluentd:fluentd:1.1.3
-
cpe:2.3:a:fluentd:fluentd:1.10.0
-
cpe:2.3:a:fluentd:fluentd:1.10.1
-
cpe:2.3:a:fluentd:fluentd:1.10.2
-
cpe:2.3:a:fluentd:fluentd:1.10.3
-
cpe:2.3:a:fluentd:fluentd:1.10.4
-
cpe:2.3:a:fluentd:fluentd:1.11.0
-
cpe:2.3:a:fluentd:fluentd:1.11.1
-
cpe:2.3:a:fluentd:fluentd:1.11.2
-
cpe:2.3:a:fluentd:fluentd:1.11.3
-
cpe:2.3:a:fluentd:fluentd:1.11.4
-
cpe:2.3:a:fluentd:fluentd:1.11.5
-
cpe:2.3:a:fluentd:fluentd:1.12.0
-
cpe:2.3:a:fluentd:fluentd:1.12.1
-
cpe:2.3:a:fluentd:fluentd:1.12.2
-
cpe:2.3:a:fluentd:fluentd:1.12.3
-
cpe:2.3:a:fluentd:fluentd:1.12.4
-
cpe:2.3:a:fluentd:fluentd:1.13.0
-
cpe:2.3:a:fluentd:fluentd:1.13.1
-
cpe:2.3:a:fluentd:fluentd:1.13.2
-
cpe:2.3:a:fluentd:fluentd:1.13.3
-
cpe:2.3:a:fluentd:fluentd:1.14.1
-
cpe:2.3:a:fluentd:fluentd:1.2.0
-
cpe:2.3:a:fluentd:fluentd:1.2.1
-
cpe:2.3:a:fluentd:fluentd:1.2.2
-
cpe:2.3:a:fluentd:fluentd:1.2.3
-
cpe:2.3:a:fluentd:fluentd:1.2.4
-
cpe:2.3:a:fluentd:fluentd:1.2.5
-
cpe:2.3:a:fluentd:fluentd:1.2.6
-
cpe:2.3:a:fluentd:fluentd:1.3.0
-
cpe:2.3:a:fluentd:fluentd:1.3.1
-
cpe:2.3:a:fluentd:fluentd:1.3.2
-
cpe:2.3:a:fluentd:fluentd:1.3.3
-
cpe:2.3:a:fluentd:fluentd:1.4.0
-
cpe:2.3:a:fluentd:fluentd:1.4.1
-
cpe:2.3:a:fluentd:fluentd:1.4.2
-
cpe:2.3:a:fluentd:fluentd:1.5.0
-
cpe:2.3:a:fluentd:fluentd:1.5.1
-
cpe:2.3:a:fluentd:fluentd:1.5.2
-
cpe:2.3:a:fluentd:fluentd:1.6.0
-
cpe:2.3:a:fluentd:fluentd:1.6.1
-
cpe:2.3:a:fluentd:fluentd:1.6.2
-
cpe:2.3:a:fluentd:fluentd:1.6.3
-
cpe:2.3:a:fluentd:fluentd:1.7.0
-
cpe:2.3:a:fluentd:fluentd:1.7.1
-
cpe:2.3:a:fluentd:fluentd:1.7.2
-
cpe:2.3:a:fluentd:fluentd:1.7.3
-
cpe:2.3:a:fluentd:fluentd:1.7.4
-
cpe:2.3:a:fluentd:fluentd:1.8.0
-
cpe:2.3:a:fluentd:fluentd:1.8.1
-
cpe:2.3:a:fluentd:fluentd:1.9.0
-
cpe:2.3:a:fluentd:fluentd:1.9.1
-
cpe:2.3:a:fluentd:fluentd:1.9.2
-
cpe:2.3:a:fluentd:fluentd:1.9.3