First published: Thu Jul 25 2024(Updated: )
The OpenObserve open-source observability platform provides the ability to filter logs in a dashboard by the values uploaded in a given log. However, all versions of the platform through 0.9.1 do not sanitize user input in the filter selection menu, which may result in complete account takeover. It has been noted that the front-end uses `DOMPurify` or Vue templating to escape cross-site scripting (XSS) extensively, however certain areas of the front end lack this XSS protection. When combining the missing protection with the insecure authentication handling that the front-end uses, a malicious user may be able to take over any victim's account provided they meet the exploitation steps. As of time of publication, no patched version is available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openobserve Openobserve | <=0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41808 is considered a high severity vulnerability due to the lack of input sanitization in the OpenObserve platform.
To fix CVE-2024-41808, upgrade to a version of OpenObserve later than 0.9.1 where this vulnerability has been addressed.
CVE-2024-41808 affects all versions of OpenObserve up to and including version 0.9.1.
CVE-2024-41808 is a security vulnerability related to improper input validation in the filtering functionality of the OpenObserve platform.
The lack of input sanitization in CVE-2024-41808 may lead to unauthorized access to user accounts and possible data exposure.