OneUptime is a solution for monitoring and managing online services. The vulnerability lies in the improper validation of client-side stored data within the web application. Specifically, the is_master_admin key, stored in the local storage of the browser, can be manipulated by an attacker. By changing this key from false to true, the application grants administrative privileges to the user, without proper server-side validation. This has been patched in 7.0.1815.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0783 OneUptime is a solution for monitoring and managing online services. The vulnerability lies in the improper validation of client-side stored data within the web application. Specifically, the is_master_admin key, stored in the local storage of the browser, can be manipulated by an attacker. By changing this key from false to true, the application grants administrative privileges to the user, without proper server-side validation. This has been patched in 7.0.1815.
Github GHSA Github GHSA GHSA-246p-xmg8-wmcq OneUptime Vulnerable to a Privilege Escalation via Local Storage Key Manipulation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-13T16:23:55.184Z

Reserved: 2024-03-18T17:07:00.095Z

Link: CVE-2024-29194

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:54.449Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-24T19:15:07.240

Modified: 2024-11-21T09:07:46.310

Link: CVE-2024-29194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.