CVE-2024-30896

9.1 CRITICAL

📋 TL;DR

InfluxDB OSS 2.x through 2.7.11 stores administrative operator tokens under the default organization, allowing users with read access to authorization resources in that organization to retrieve sensitive tokens. This affects only InfluxDB OSS 2.x installations, not 1.x, Enterprise, Cloud, or Clustered versions. The vulnerability enables privilege escalation by exposing administrative credentials to users with limited permissions.

💻 Affected Systems

Products:
  • InfluxDB OSS
Versions: 2.x through 2.7.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects OSS version 2.x. InfluxDB 1.x, Enterprise, Cloud, Cloud Dedicated, and Clustered versions are NOT affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with read access to default organization authorization resources can obtain operator tokens, leading to full administrative control over the InfluxDB instance, data exfiltration, data manipulation, and potential lateral movement.

🟠

Likely Case

Authorized users with read permissions in the default organization can escalate privileges to administrative level, gaining unauthorized access to sensitive data and system configuration.

🟢

If Mitigated

With proper access controls limiting users to non-default organizations, the impact is minimal as tokens remain inaccessible to unauthorized users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing user credentials with read access to authorization resources in the default organization. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.0

Vendor Advisory: https://github.com/influxdata/influxdb/releases/tag/v2.8.0

Restart Required: Yes

Instructions:

1. Backup your InfluxDB data and configuration. 2. Download InfluxDB 2.8.0 from official repository. 3. Stop the InfluxDB service. 4. Install/upgrade to version 2.8.0. 5. Restart the InfluxDB service. 6. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict Default Organization Access

all

Move all non-administrative users to non-default organizations and restrict access to default organization authorization resources.

influx org members list --org-id <default-org-id>
influx org members remove --member <user-id> --org-id <default-org-id>
influx org members add --member <user-id> --org-id <non-default-org-id>

🧯 If You Can't Patch

  • Implement strict access controls ensuring only administrators have access to default organization resources
  • Monitor and audit all token retrieval attempts and authorization resource access patterns

🔍 How to Verify

Check if Vulnerable:

Check InfluxDB version: if running 2.x and version is 2.7.11 or earlier, system is vulnerable. Verify if users with read-only permissions in default organization can access authorization resources.

Check Version:

influx version

Verify Fix Applied:

After upgrading to 2.8.0, verify version is 2.8.0 or higher and test that users without administrative privileges cannot retrieve operator tokens via API calls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual token retrieval patterns
  • Multiple failed authorization attempts followed by successful token access
  • Users with limited permissions accessing administrative endpoints

Network Indicators:

  • API calls to /api/v2/authorizations endpoint from non-admin users
  • Increased traffic to token-related endpoints

SIEM Query:

source="influxdb" AND (uri_path="/api/v2/authorizations" OR message="token retrieval") AND user_role!="admin"

🔗 References

📤 Share & Export