Description
OneUptime is a solution for monitoring and managing online services. The vulnerability lies in the improper validation of client-side stored data within the web application. Specifically, the is_master_admin key, stored in the local storage of the browser, can be manipulated by an attacker. By changing this key from false to true, the application grants administrative privileges to the user, without proper server-side validation. This has been patched in 7.0.1815.
References (2)
Core 2
Core References
Exploit, Release Notes x_refsource_confirm
https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq
Scores
CVSS v3
8.3
EPSS
0.0009
EPSS Percentile
25.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-639
Status
published
Products (3)
hackerbay/oneuptime
7.0.1803 - 7.0.1815
oneuptime/common-server
0 - 7.0.1815npm
oneuptime/model
0 - 7.0.1815npm
Published
Mar 24, 2024
Tracked Since
Feb 18, 2026