logo

CVE-2025-30373 org.graylog2:graylog2-server

Package

Manager: maven
Name: org.graylog2:graylog2-server
Vulnerable Version: >=6.1.0 <6.1.9

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L

EPSS: 0.00015 pctl0.02133

Details

Graylog's Authenticated HTTP inputs ingest message even if Authorization header is missing or has wrong value ### Impact Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. ### Patches ### Workarounds Disabling http-based inputs and allow only authenticated pull-based inputs. Analysis provided by Fabian Yamaguchi - Whirly Labs (Pty) Ltd

Metadata

Created: 2025-04-07T16:37:52Z
Modified: 2025-05-07T15:03:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-q7g5-jq6p-6wvx/GHSA-q7g5-jq6p-6wvx.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-q7g5-jq6p-6wvx
Finding: F039
Auto approve: 1