Kritische Sicherheitslücke in OneUptime - CVE-2026-32306

⚠️ CVE-Referenzen: CVE-2026-32306

Zusammenfassung

Die Sicherheitslücke CVE-2026-32306 in der Telemetrie-Aggregations-API von OneUptime erlaubt es authentifizierten Nutzern, beliebigen SQL-Code in ClickHouse einzuschleusen. Dies ermöglicht den vollständigen Zugriff auf Telemetriedaten aller Mandanten, Datenmanipulation und potenziell sogar Remote-Code-Ausführung. Der Patch in Version 10.0.23 behebt dieses kritische Problem.

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them directly into ClickHouse SQL queries via the .append() method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and no input validation. An authenticated user can inject arbitrary SQL into ClickHouse, enabling full database read (including telemetry data from all tenants), data modification, and potential remote code execution via ClickHouse table functions. This vulnerability is fixed in 10.0.23.
Quelle: app.opencve.io