Arbitrary Class Loading Vulnerability in Graylog's Cluster Config System
CVE-2024-24824

8.8HIGH

Key Information:

Vendor

Graylog2

Vendor
CVE Published:
7 February 2024

What is CVE-2024-24824?

Graylog, a widely used open-source log management platform, is susceptible to a vulnerability that enables the loading and instantiation of arbitrary classes. This issue arises from the handling of HTTP PUT requests to the /api/system/cluster_config/ endpoint, where the system permits the submission of fully qualified class names as configuration keys. If executed by an authorized user, this vulnerability can lead to code execution during class instantiation, facilitating potential data exposure. Notably, when the java.io.File class is used, the internal web-server's response could inadvertently reveal sensitive file content. Resolutions for this flaw were incorporated in Graylog versions 5.1.11 and 5.2.4.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

graylog2-server >= 2.0.0, < 5.1.11 < 2.0.0, 5.1.11

graylog2-server >= 5.2.0, < 5.2.4 < 5.2.0, 5.2.4

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.