Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0.
References
Link | Resource |
---|---|
https://github.com/fleetdm/fleet/commit/f68f4238e83b45b2164e4ed05df14af0f06eaf40 | Patch Third Party Advisory |
https://github.com/fleetdm/fleet/security/advisories/GHSA-xwh8-9p3f-3x45 | Third Party Advisory |
https://www.npmjs.com/package/fleetctl | Product Third Party Advisory |
Configurations
Information
Published : 2021-02-10 12:15
Updated : 2022-10-21 15:40
NVD link : CVE-2021-21296
Mitre link : CVE-2021-21296
JSON object : View
CWE
Products Affected
fleetdm
- fleet