Graylog Allows Session Takeover via Insufficient HTML Sanitization
High severity
GitHub Reviewed
Published
May 7, 2025
in
Graylog2/graylog2-server
•
Updated May 7, 2025
Package
Affected versions
<= 6.0.13
>= 6.1.0, <= 6.1.9
Patched versions
6.0.14
6.1.10
Description
Published to the GitHub Advisory Database
May 7, 2025
Reviewed
May 7, 2025
Published by the National Vulnerability Database
May 7, 2025
Last updated
May 7, 2025
Impact
It is possible to obtain user session cookies by submitting an HTML form as part of an Event Definition Remediation Step field.
For this attack to succeed, the attacker needs a user account with permissions to create event definitions, while the user must have permissions to view alerts. Additionally, an active Input must be present on the Graylog server that is capable of receiving form data (e.g. a HTTP input, TCP raw or syslog etc).
Patches
Workarounds
None, as long as the relatively rare prerequisites are met.
Analysis provided by Fabian Yamaguchi - Whirly Labs (Pty) Ltd
References