logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-36821

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-36821

Description:
Uptime Kuma, a self-hosted monitoring tool, allows an authenticated attacker to install a maliciously crafted plugin in versions prior to 1.22.1, which may lead to remote code execution. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. After downloading a plugin, it's installed by calling `npm install` in the installation directory of the plugin. Because the plugin is not validated against the official list of plugins or installed with `npm install --ignore-scripts`, a maliciously crafted plugin taking advantage of npm scripts can gain remote code execution. Version 1.22.1 contains a patch for this issue.
Last updated date:
07/12/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/12/2023
Reference url to background

https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy