Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-675q-66gf-gqg8: OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation

Summary

During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.

PoC

Intercept the login response and change “isMasterAdmin": false → “isMasterAdmin": true <img width="1405” height="567” alt="image" src="https://github.com/user-attachments/assets/7036398b-bb41-46c1-b66a-e49ec2bc3abb" /> <img width="1533" height="476" alt="2" src="https://github.com/user-attachments/assets/4efcaef5-a939-4729-be43-3af62a7d02f8" />

Impact

The admin dashboard is viewable.

ghsa
#git

Summary

During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.

PoC

Intercept the login response and change "isMasterAdmin": false → "isMasterAdmin": true

Impact

The admin dashboard is viewable.

References

  • GHSA-675q-66gf-gqg8
  • OneUptime/oneuptime@3e72b2a

ghsa: Latest News

GHSA-f43r-cc68-gpx4: External Control of File Name or Path in Langflow