Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. To mitigate the vulnerability, disable http-based inputs and allow only authenticated pull-based inputs. This vulnerability is fixed in 6.1.9.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 07 Apr 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. To mitigate the vulnerability, disable http-based inputs and allow only authenticated pull-based inputs. This vulnerability is fixed in 6.1.9. | |
Title | Graylog Authenticated HTTP inputs do ingest message even if Authorization header is missing or has wrong value | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-08T19:02:45.783Z
Reserved: 2025-03-21T14:12:06.272Z
Link: CVE-2025-30373

Updated: 2025-04-08T19:02:40.264Z

Status : Awaiting Analysis
Published: 2025-04-07T15:15:43.887
Modified: 2025-04-08T18:14:17.307
Link: CVE-2025-30373

No data.