CVE-2024-24830

OpenObserve is a observability platform built specifically for logs, metrics, traces, analytics, designed to work at petabyte scale. A vulnerability has been identified in the "/api/{org_id}/users" endpoint. This vulnerability allows any authenticated regular user ('member') to add new users with elevated privileges, including the 'root' role, to an organization. This issue circumvents the intended security controls for role assignments. The vulnerability resides in the user creation process, where the payload does not validate the user roles. A regular user can manipulate the payload to assign root-level privileges. This vulnerability leads to Unauthorized Privilege Escalation and significantly compromises the application's role-based access control system. It allows unauthorized control over application resources and poses a risk to data security. All users, particularly those in administrative roles, are impacted. This issue has been addressed in release version 0.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openobserve:openobserve:*:*:*:*:*:*:*:*

History

08 May 2025, 19:15

Type Values Removed Values Added
CWE CWE-287
CWE-269
CWE-284
CWE-285
CWE-272

15 Feb 2024, 18:53

Type Values Removed Values Added
References () https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v - () https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v - Exploit, Third Party Advisory
CPE cpe:2.3:a:openobserve:openobserve:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Openobserve
Openobserve openobserve

08 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-08 23:15

Updated : 2025-05-08 19:15


NVD link : CVE-2024-24830

Mitre link : CVE-2024-24830


JSON object : View

Products Affected

openobserve

  • openobserve
CWE

No CWE.