Vulnerability Description
The OpenObserve open-source observability platform provides the ability to filter logs in a dashboard by the values uploaded in a given log. However, all versions of the platform through 0.9.1 do not sanitize user input in the filter selection menu, which may result in complete account takeover. It has been noted that the front-end uses `DOMPurify` or Vue templating to escape cross-site scripting (XSS) extensively, however certain areas of the front end lack this XSS protection. When combining the missing protection with the insecure authentication handling that the front-end uses, a malicious user may be able to take over any victim's account provided they meet the exploitation steps. As of time of publication, no patched version is available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openobserve | Openobserve | <= 0.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/openobserve/openobserve/security/advisories/GHSA-hx23-g7m8-h7ExploitMitigationVendor Advisory
- https://github.com/openobserve/openobserve/security/advisories/GHSA-hx23-g7m8-h7ExploitMitigationVendor Advisory
FAQ
What is CVE-2024-41808?
CVE-2024-41808 is a vulnerability with a CVSS score of 8.8 (HIGH). The OpenObserve open-source observability platform provides the ability to filter logs in a dashboard by the values uploaded in a given log. However, all versions of the platform through 0.9.1 do not ...
How severe is CVE-2024-41808?
CVE-2024-41808 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41808?
Check the references section above for vendor advisories and patch information. Affected products include: Openobserve Openobserve.