Kritische RCE-Lücke in OneUptime Monitoring Lösung - CVE-2026-27574

⚠️ CVE-Referenzen: CVE-2026-27574

Zusammenfassung

Eine schwerwiegende Sicherheitslücke in der OneUptime Monitoring-Lösung ermöglicht Angreifern, den Sandbox-Schutz zu umgehen und die vollständige Kontrolle über den zugrunde liegenden Prozess zu erlangen. Die Lücke betrifft die fehlerhafte Verwendung des Node.js-Moduls "node:vm" für die Ausführung von benutzerdefiniertem JavaScript. Betroffen sind auch sensible Umgebungsvariablen mit wichtigen Cluster-Anmeldeinformationen. Ein Patch ist in Version 10.0.5 von OneUptime verfügbar.

Oneuptime - Oneuptime - CRITICAL - CVE-2026-27574. The OneUptime monitoring solution is vulnerable due to a flaw in its custom JavaScript monitor feature, which improperly uses the Node.js's node:vm module for code execution. This creates a serious security risk, allowing attackers to escape the sandbox environment trivially and gain full control over the underlying process. The probe runs on host networking and exposes sensitive environment variables containing crucial cluster credentials, such as ONEUPTIME_SECRET and various database passwords. Additionally, the monitor creation feature is accessible to users with the lowest privileges, including anonymous visitors, potentially allowing them to compromise the entire cluster within a matter of seconds. This vulnerability has been resolved in version 10.0.5 of OneUptime.
Quelle: securityvulnerability.io