CVE-2026-27728

9.9 CRITICAL

📋 TL;DR

CVE-2026-27728 is an OS command injection vulnerability in OneUptime's NetworkPathMonitor.performTraceroute() function that allows authenticated project users to execute arbitrary operating system commands on the Probe server by injecting shell metacharacters into a monitor's destination field. This affects all OneUptime deployments prior to version 10.0.7 where users have project access.

💻 Affected Systems

Products:
  • OneUptime
Versions: All versions prior to 10.0.7
Operating Systems: All platforms running OneUptime
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated project user access. Probe servers are typically deployed in monitoring infrastructure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Probe server leading to lateral movement, data exfiltration, or deployment of ransomware across monitored infrastructure.

🟠

Likely Case

Unauthorized command execution on the Probe server allowing privilege escalation, data theft, or disruption of monitoring services.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a traceroute function that likely passes user input directly to shell commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.7

Vendor Advisory: https://github.com/OneUptime/oneuptime/security/advisories/GHSA-jmhp-5558-qxh5

Restart Required: Yes

Instructions:

1. Backup your OneUptime configuration and data. 2. Update to version 10.0.7 or later using your deployment method (Docker, Kubernetes, etc.). 3. Restart all OneUptime services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Project User Access

all

Temporarily limit project user permissions to essential functions only, removing access to network monitoring features.

Network Segmentation

all

Isolate Probe servers from critical infrastructure using firewall rules to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for the destination field in NetworkPathMonitor
  • Deploy network monitoring and intrusion detection systems to alert on suspicious command execution from Probe servers

🔍 How to Verify

Check if Vulnerable:

Check your OneUptime version. If it's below 10.0.7 and you have authenticated project users, you are vulnerable.

Check Version:

Check the OneUptime admin dashboard or run: docker inspect oneuptime | grep VERSION

Verify Fix Applied:

After updating to 10.0.7+, verify that shell metacharacters in monitor destination fields are properly sanitized and do not execute commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution from OneUptime processes
  • Multiple failed traceroute attempts with unusual parameters
  • Shell command patterns in destination field logs

Network Indicators:

  • Unexpected outbound connections from Probe servers
  • Network traffic to unusual ports from monitoring infrastructure

SIEM Query:

process.name: "traceroute" OR process.name: "ping" AND parent.process.name: "node" AND command_line CONTAINS "$" OR command_line CONTAINS "|" OR command_line CONTAINS ";"

🔗 References

📤 Share & Export