CVE-2023-36822

Uptime Kuma, a self-hosted monitoring tool, has a path traversal vulnerability in versions prior to 1.22.1. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. Before a plugin is downloaded, the plugin installation directory is checked for existence. If it exists, it's removed before the plugin installation. Because the plugin is not validated against the official list of plugins or sanitized, the check for existence and the removal of the plugin installation directory are prone to path traversal. This vulnerability allows an authenticated attacker to delete files from the server Uptime Kuma is running on. Depending on which files are deleted, Uptime Kuma or the whole system may become unavailable due to data loss.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uptime-kuma_project:uptime-kuma:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 6.5
References () https://github.com/louislam/uptime-kuma/blob/de74efb2e6601dcbcfed32cddefc4078a80fcb0b/server/plugins-manager.js#L75-L80 - Product () https://github.com/louislam/uptime-kuma/blob/de74efb2e6601dcbcfed32cddefc4078a80fcb0b/server/plugins-manager.js#L75-L80 - Product
References () https://github.com/louislam/uptime-kuma/pull/3346 - Patch () https://github.com/louislam/uptime-kuma/pull/3346 - Patch
References () https://github.com/louislam/uptime-kuma/releases/tag/1.22.1 - Release Notes () https://github.com/louislam/uptime-kuma/releases/tag/1.22.1 - Release Notes
References () https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 - Exploit, Vendor Advisory () https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 - Exploit, Vendor Advisory

12 Jul 2023, 16:12

Type Values Removed Values Added
References (MISC) https://github.com/louislam/uptime-kuma/blob/de74efb2e6601dcbcfed32cddefc4078a80fcb0b/server/plugins-manager.js#L75-L80 - (MISC) https://github.com/louislam/uptime-kuma/blob/de74efb2e6601dcbcfed32cddefc4078a80fcb0b/server/plugins-manager.js#L75-L80 - Product
References (MISC) https://github.com/louislam/uptime-kuma/pull/3346 - (MISC) https://github.com/louislam/uptime-kuma/pull/3346 - Patch
References (MISC) https://github.com/louislam/uptime-kuma/releases/tag/1.22.1 - (MISC) https://github.com/louislam/uptime-kuma/releases/tag/1.22.1 - Release Notes
References (MISC) https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 - (MISC) https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7 - Exploit, Vendor Advisory
CPE cpe:2.3:a:uptime-kuma_project:uptime-kuma:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

05 Jul 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-05 22:15

Updated : 2024-11-21 08:10


NVD link : CVE-2023-36822

Mitre link : CVE-2023-36822

CVE.ORG link : CVE-2023-36822


JSON object : View

Products Affected

uptime-kuma_project

  • uptime-kuma
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')