Plattform
go
Komponente
openobserve
Behoben in
0.8.1
A critical vulnerability (CVE-2024-25106) has been discovered in OpenObserve, an observability platform designed for petabyte-scale log, metric, and trace analysis. This vulnerability resides in the /api/{orgid}/users/{emailid} endpoint and allows authenticated users within an organization to remove any other user, regardless of their role, including administrators. The vulnerability impacts OpenObserve versions 0.7.9 and earlier, and a fix is available in version 0.8.0.
The impact of CVE-2024-25106 is severe due to its potential for complete organizational control compromise. An attacker, possessing even a low-privilege account within an OpenObserve organization, can leverage this vulnerability to remove all other users, including those with administrative privileges. This effectively grants the attacker full control over the OpenObserve instance, enabling them to access sensitive data, modify configurations, and potentially pivot to other systems within the organization. The ability to remove root users bypasses all standard access controls, making this a high-impact privilege escalation vulnerability. This is akin to a complete takeover of the observability platform, potentially exposing critical operational data and hindering incident response capabilities.
CVE-2024-25106 was publicly disclosed on February 8, 2024. The vulnerability is not currently listed on the CISA KEV catalog, but its critical severity warrants close monitoring. Public proof-of-concept exploits are not yet widely available, but the ease of exploitation, given the requirement of only an authenticated user account, suggests a high probability of exploitation if left unpatched. The vulnerability's impact on observability data makes it a particularly attractive target for malicious actors seeking to disrupt operations or exfiltrate sensitive information.
Organizations utilizing OpenObserve for observability and monitoring are at risk, particularly those with multiple users and a reliance on the platform for critical operational insights. Environments with shared hosting configurations or those that have not implemented robust access control policies are especially vulnerable, as a compromised low-privilege account could be leveraged to gain complete control.
• linux / server:
journalctl -u openobserve -g "user removal"• generic web:
curl -s -X DELETE "http://openobserve/api/{org_id}/users/{email_id}" | grep -i "success"• generic web:
grep -i "user removal" /var/log/nginx/access.logdisclosure
Exploit-Status
EPSS
0.08% (25% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-25106 is to immediately upgrade OpenObserve to version 0.8.0 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restricting access to the /api/{orgid}/users/{emailid} endpoint using network firewalls or access control lists (ACLs) can limit the attack surface. Carefully review user permissions and ensure the principle of least privilege is enforced. Monitor OpenObserve logs for suspicious user activity, particularly attempts to modify user accounts. While a direct WAF rule is difficult to implement without deep inspection of the request payload, monitoring for unusual user deletion patterns could provide an early warning signal.
Aktualisieren Sie OpenObserve auf Version 0.8.0 oder höher. Diese Version behebt die Autorisierungsschwachstelle, die es nicht autorisierten Benutzern ermöglicht, andere Benutzer aus der Organisation zu entfernen. Das Update verhindert unbefugten Zugriff und mögliche Betriebsunterbrechungen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-25106 is a critical vulnerability in OpenObserve versions ≤0.7.9 that allows authenticated users to remove any other user, including administrators, potentially granting unauthorized access and control.
If you are running OpenObserve version 0.7.9 or earlier, you are affected by this vulnerability and should prioritize upgrading to a patched version.
The recommended fix is to upgrade to OpenObserve version 0.8.0 or later. Temporary workarounds include restricting access to the vulnerable endpoint and reviewing user permissions.
While no active exploitation has been publicly confirmed, the vulnerability's ease of exploitation and critical severity suggest a high probability of exploitation if left unpatched.
Refer to the OpenObserve security advisory for detailed information and updates: [https://github.com/openobserve/openobserve/security/advisories/GHSA-9g7x-x453-4444](https://github.com/openobserve/openobserve/security/advisories/GHSA-9g7x-x453-4444)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine go.mod-Datei hoch und wir sagen dir sofort, ob du betroffen bist.