GHSA-675q-66gf-gqg8

Suggest an improvement
Source
https://github.com/advisories/GHSA-675q-66gf-gqg8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-675q-66gf-gqg8/GHSA-675q-66gf-gqg8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-675q-66gf-gqg8
Published
2025-11-25T22:55:50Z
Modified
2025-11-25T23:33:44.539838Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation
Details

Summary

During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.

PoC

Intercept the login response and change "isMasterAdmin": false → "isMasterAdmin": true <img width="1405" height="567" alt="image" src="https://github.com/user-attachments/assets/7036398b-bb41-46c1-b66a-e49ec2bc3abb" /> <img width="1533" height="476" alt="2" src="https://github.com/user-attachments/assets/4efcaef5-a939-4729-be43-3af62a7d02f8" />

Impact

The admin dashboard is viewable.

Database specific
{
    "cwe_ids": [
        "CWE-284",
        "CWE-863"
    ],
    "github_reviewed": true,
    "severity": "MODERATE",
    "github_reviewed_at": "2025-11-25T22:55:50Z",
    "nvd_published_at": null
}
References

Affected packages

npm / @oneuptime/common

Package

Name
@oneuptime/common
View open source insights on deps.dev
Purl
pkg:npm/%40oneuptime/common

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.5567