CVE-2024-52506:
Graylog concurrent PDF report rendering can leak other users' reports
7.1
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/18/2024
Updated
11/19/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.graylog:graylog-parent | maven | >= 6.1.0, < 6.1.2 | 6.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper management of headless browser instances during concurrent report generation. The ReportService.renderReport function likely coordinates rendering requests while PDFRenderer.generate handles the actual PDF generation. The system's failure to maintain proper instance isolation between concurrent requests suggests missing synchronization mechanisms or shared state management in these components. The high confidence for ReportService reflects its role in request coordination, while medium confidence for PDFRenderer acknowledges potential implementation variations in browser instance handling.