प्लेटफ़ॉर्म
go
घटक
openobserve
में ठीक किया गया
0.8.1
A critical vulnerability (CVE-2024-25106) has been discovered in OpenObserve, an observability platform designed for petabyte-scale log, metric, and trace analysis. This vulnerability resides in the /api/{orgid}/users/{emailid} endpoint and allows authenticated users within an organization to remove any other user, regardless of their role, including administrators. The vulnerability impacts OpenObserve versions 0.7.9 and earlier, and a fix is available in version 0.8.0.
The impact of CVE-2024-25106 is severe due to its potential for complete organizational control compromise. An attacker, possessing even a low-privilege account within an OpenObserve organization, can leverage this vulnerability to remove all other users, including those with administrative privileges. This effectively grants the attacker full control over the OpenObserve instance, enabling them to access sensitive data, modify configurations, and potentially pivot to other systems within the organization. The ability to remove root users bypasses all standard access controls, making this a high-impact privilege escalation vulnerability. This is akin to a complete takeover of the observability platform, potentially exposing critical operational data and hindering incident response capabilities.
CVE-2024-25106 was publicly disclosed on February 8, 2024. The vulnerability is not currently listed on the CISA KEV catalog, but its critical severity warrants close monitoring. Public proof-of-concept exploits are not yet widely available, but the ease of exploitation, given the requirement of only an authenticated user account, suggests a high probability of exploitation if left unpatched. The vulnerability's impact on observability data makes it a particularly attractive target for malicious actors seeking to disrupt operations or exfiltrate sensitive information.
Organizations utilizing OpenObserve for observability and monitoring are at risk, particularly those with multiple users and a reliance on the platform for critical operational insights. Environments with shared hosting configurations or those that have not implemented robust access control policies are especially vulnerable, as a compromised low-privilege account could be leveraged to gain complete control.
• linux / server:
journalctl -u openobserve -g "user removal"• generic web:
curl -s -X DELETE "http://openobserve/api/{org_id}/users/{email_id}" | grep -i "success"• generic web:
grep -i "user removal" /var/log/nginx/access.logdisclosure
एक्सप्लॉइट स्थिति
EPSS
0.08% (25% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2024-25106 is to immediately upgrade OpenObserve to version 0.8.0 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restricting access to the /api/{orgid}/users/{emailid} endpoint using network firewalls or access control lists (ACLs) can limit the attack surface. Carefully review user permissions and ensure the principle of least privilege is enforced. Monitor OpenObserve logs for suspicious user activity, particularly attempts to modify user accounts. While a direct WAF rule is difficult to implement without deep inspection of the request payload, monitoring for unusual user deletion patterns could provide an early warning signal.
OpenObserve को संस्करण 0.8.0 या उच्चतर में अपडेट करें। यह संस्करण प्राधिकरण भेद्यता को ठीक करता है जो अनधिकृत उपयोगकर्ताओं को संगठन से अन्य उपयोगकर्ताओं को हटाने की अनुमति देता है। अपडेट अनधिकृत पहुंच और संभावित परिचालन व्यवधान को रोकेगा।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2024-25106 is a critical vulnerability in OpenObserve versions ≤0.7.9 that allows authenticated users to remove any other user, including administrators, potentially granting unauthorized access and control.
If you are running OpenObserve version 0.7.9 or earlier, you are affected by this vulnerability and should prioritize upgrading to a patched version.
The recommended fix is to upgrade to OpenObserve version 0.8.0 or later. Temporary workarounds include restricting access to the vulnerable endpoint and reviewing user permissions.
While no active exploitation has been publicly confirmed, the vulnerability's ease of exploitation and critical severity suggest a high probability of exploitation if left unpatched.
Refer to the OpenObserve security advisory for detailed information and updates: [https://github.com/openobserve/openobserve/security/advisories/GHSA-9g7x-x453-4444](https://github.com/openobserve/openobserve/security/advisories/GHSA-9g7x-x453-4444)
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी go.mod फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।