Headline
GHSA-675q-66gf-gqg8: OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation
Summary
During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.
PoC
Intercept the login response and change “isMasterAdmin": false → “isMasterAdmin": true <img width="1405” height="567” alt="image" src="https://github.com/user-attachments/assets/7036398b-bb41-46c1-b66a-e49ec2bc3abb" /> <img width="1533" height="476" alt="2" src="https://github.com/user-attachments/assets/4efcaef5-a939-4729-be43-3af62a7d02f8" />
Impact
The admin dashboard is viewable.
Summary
During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.
PoC
Intercept the login response and change "isMasterAdmin": false → "isMasterAdmin": true
Impact
The admin dashboard is viewable.
References
- GHSA-675q-66gf-gqg8
- OneUptime/oneuptime@3e72b2a