CVE-2026-30233

6.5 MEDIUM

📋 TL;DR

This CVE describes an authorization flaw in OliveTin web interface that allows authenticated users with 'view: false' permission to enumerate action bindings and metadata via dashboard and API endpoints. While execution is correctly denied, users can retrieve sensitive information including action titles, IDs, icons, and argument metadata. This affects all OliveTin instances with users having restricted view permissions.

💻 Affected Systems

Products:
  • OliveTin
Versions: All versions prior to 3000.11.1
Operating Systems: All platforms running OliveTin
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated users with 'view: false' permission configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the entire command infrastructure, identify sensitive operations, and use the gathered metadata to plan further attacks or social engineering attempts against administrators.

🟠

Likely Case

Restricted users gain unauthorized visibility into system operations and command structures, potentially identifying high-value targets for privilege escalation or lateral movement.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure without execution capabilities.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed instances could allow attackers with compromised credentials to gather reconnaissance data.
🏢 Internal Only: MEDIUM - Internal users with restricted permissions could abuse this to gather information about system operations they shouldn't see.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but simple API/dashboard requests.

Exploitation requires valid user credentials with restricted view permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3000.11.1

Vendor Advisory: https://github.com/OliveTin/OliveTin/security/advisories/GHSA-jf73-858c-54pg

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop OliveTin service. 3. Update to version 3000.11.1 or later. 4. Restart OliveTin service. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict User Permissions

all

Temporarily remove 'view: false' permissions from users or restrict access to dashboard/API endpoints.

# Edit OliveTin configuration to modify user permissions
# Set view: true for all users or restrict dashboard access

🧯 If You Can't Patch

  • Implement network segmentation to isolate OliveTin instances from sensitive systems
  • Enhance monitoring of API and dashboard access patterns for unusual enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Check OliveTin version and verify if users with 'view: false' permission can access action metadata via dashboard or API endpoints.

Check Version:

olivetin --version

Verify Fix Applied:

After patching, test that users with 'view: false' permission cannot retrieve action titles, IDs, icons, or argument metadata.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests from users with restricted permissions
  • Multiple sequential requests to action metadata endpoints

Network Indicators:

  • Patterns of enumeration requests to /api/actions or dashboard endpoints

SIEM Query:

source="olivetin" AND (uri_path="/api/actions" OR uri_path="/dashboard") AND user_permission="view:false"

🔗 References

📤 Share & Export