CVE-2024-50609

Published Feb 18, 2025

Last updated 9 days ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-50609 is a vulnerability found in Fluent Bit version 3.1.9. Specifically, it affects the OpenTelemetry input plugin when it's actively listening on a network port. An attacker can exploit this vulnerability by sending a specially crafted packet with a "Content-Length" header set to zero. This action can cause a null pointer dereference within the `cfl_sds_len` function, leading to a server crash and a denial-of-service condition. The root cause lies in the improper handling of the "Content-Length" header value when it's set to 0. This vulnerability allows a remote attacker with access to the OpenTelemetry plugin's listening port to perform a denial-of-service attack. The attack can be executed by sending a simple HTTP POST request with the malicious "Content-Length" header using a tool like cURL. The function `process_payload_traces_proto_ng()` within the `opentelemetry_prot.c` file is implicated in this vulnerability.

Description
An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c.
Source
cve@mitre.org
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-476

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. Fluent Bit #zeroday Vulnerabilities CVE-2024-50608 and CVE-2024-50609 Expose Billions of Production Environments to Cyber Attacks: #CloudSecurity #fluentbit 👇 https://t.co/V1FZwmyWjf

    @step9consulting

    26 Feb 2025

    21 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. OSSのログ処理ツールFluent BitでDoS脆弱性が修正。CVE-2024-50608とCVE-2024-50609はいずれもPrometheus Remote Write及びOpenTelemetのプラグインに起因するもの。Content-Length: 0のパケットを送りつけるとサーバがクラッシュする。 https://t.co/mSVSrXFYs1

    @__kokumoto

    22 Feb 2025

    1226 Impressions

    3 Retweets

    16 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  3. Threat Alert: Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber A CVE-2024-50608 CVE-2024-50609 Severity: 🟡 Medium Maturity: 🧨 Trending Learn more: https://t.co/bCyhYPfNRD #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    22 Feb 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. ⚠️ Vulnerability Alert: Critical Vulnerabilities in Fluent Bit Expose Cloud Services to Cyber Attacks 📅 Timeline: Disclosure: 2025-02-18 Patch: 2025-02-18 📌 Attribution: Ebryx Cybersecurity Research Team 🆔 CVE IDs: CVE-2024-50608, CVE-2024-50609 📊 Base Score: 8.9…

    @syedaquib77

    21 Feb 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. CVE-2024-50609 An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Conten… https://t.co/5avqaJfTZn

    @CVEnew

    18 Feb 2025

    268 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes