The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)
References
Link | Resource |
---|---|
https://github.com/GuillaumePetit84/CVE-2020-35488 | Exploit Mitigation Third Party Advisory |
https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt#L2 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2021-01-05 07:15
Updated : 2022-04-29 05:45
NVD link : CVE-2020-35488
Mitre link : CVE-2020-35488
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
nxlog
- nxlog