CVE-2025-66028

8.2 HIGH

📋 TL;DR

OneUptime versions before 8.0.5567 contain a privilege escalation vulnerability where attackers can manipulate the login response to gain admin dashboard access. By intercepting and changing the 'isMasterAdmin' parameter from false to true during authentication, attackers can bypass authorization controls. This affects all OneUptime deployments running vulnerable versions.

💻 Affected Systems

Products:
  • OneUptime
Versions: All versions before 8.0.5567
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All OneUptime deployments with the vulnerable code are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to the monitoring platform, potentially compromising all monitored services, stealing sensitive data, and disrupting critical infrastructure monitoring.

🟠

Likely Case

Attackers gain access to admin dashboard interface but may be limited in actual data access due to additional permission checks, potentially allowing reconnaissance and limited unauthorized actions.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized access attempts are detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials and ability to intercept/modify HTTP responses. The vulnerability is simple to exploit with basic web proxy tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.5567

Vendor Advisory: https://github.com/OneUptime/oneuptime/security/advisories/GHSA-675q-66gf-gqg8

Restart Required: Yes

Instructions:

1. Backup your OneUptime instance. 2. Update to version 8.0.5567 or later using your deployment method (Docker, Kubernetes, etc.). 3. Restart the application. 4. Verify the fix by checking the version and testing login functionality.

🔧 Temporary Workarounds

Network Traffic Encryption Enforcement

all

Enforce HTTPS/TLS for all OneUptime traffic to make interception more difficult

Configure web server to redirect HTTP to HTTPS
Set HSTS headers

Web Application Firewall Rules

all

Block or alert on HTTP response manipulation attempts

Configure WAF to detect response parameter tampering

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OneUptime from untrusted networks
  • Deploy additional authentication and authorization layers (2FA, IP whitelisting)

🔍 How to Verify

Check if Vulnerable:

Check if your OneUptime version is below 8.0.5567 by examining the application version in the admin interface or deployment configuration.

Check Version:

Check OneUptime web interface or run: docker inspect oneuptime_app | grep VERSION

Verify Fix Applied:

After updating to 8.0.5567+, attempt to reproduce the vulnerability by intercepting login traffic and modifying the isMasterAdmin parameter - this should no longer grant unauthorized access.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with admin privileges
  • Unusual user agent or IP addresses accessing admin endpoints

Network Indicators:

  • HTTP response manipulation patterns in proxy logs
  • Unencrypted authentication traffic

SIEM Query:

source="oneuptime" AND (event="login" AND isMasterAdmin="true") FROM users NOT IN admin_users

🔗 References

📤 Share & Export