CVE-2024-24830

9.9 CRITICAL

📋 TL;DR

This vulnerability allows any authenticated regular user in OpenObserve to create new users with administrative 'root' privileges, bypassing intended role-based access controls. It leads to unauthorized privilege escalation and compromises the entire access control system. All users of affected versions are impacted, particularly administrators.

💻 Affected Systems

Products:
  • OpenObserve
Versions: All versions before 0.8.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where regular users have access to the vulnerable endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the OpenObserve instance, allowing them to access, modify, or delete all logs, metrics, traces, and analytics data, potentially compromising entire observability infrastructure.

🟠

Likely Case

Malicious or compromised regular users escalate their privileges to root level, gaining unauthorized access to sensitive observability data and administrative functions.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the OpenObserve instance itself, though data confidentiality and integrity remain compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via API manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.8.0

Vendor Advisory: https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v

Restart Required: Yes

Instructions:

1. Backup your OpenObserve configuration and data. 2. Stop the OpenObserve service. 3. Upgrade to version 0.8.0 or later. 4. Restart the service. 5. Verify the upgrade was successful.

🧯 If You Can't Patch

  • Restrict network access to OpenObserve API endpoints to only trusted administrative users.
  • Implement API gateway or WAF rules to block requests to /api/{org_id}/users endpoint from non-admin users.

🔍 How to Verify

Check if Vulnerable:

Check if your OpenObserve version is below 0.8.0 by accessing the web interface or checking the running container/process version.

Check Version:

curl -s http://localhost:5080/api/system/version | grep version

Verify Fix Applied:

After upgrading to 0.8.0 or later, verify that regular users cannot create users with root privileges via the /api/{org_id}/users endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation events from non-admin accounts
  • API requests to /api/{org_id}/users with role parameters containing 'root' or elevated privileges

Network Indicators:

  • POST requests to /api/{org_id}/users endpoint from non-admin user accounts

SIEM Query:

source="openobserve" AND (path="/api/*/users" AND method="POST") AND user_role!="admin" AND user_role!="root"

🔗 References

📤 Share & Export