CVE-2023-49804
JavaScript vulnerability analysis and mitigation

Overview

Uptime Kuma, an easy-to-use self-hosted monitoring tool, was found to contain a session management vulnerability (CVE-2023-49804) prior to version 1.23.9. When a user changes their login password, previously logged-in users retain access without being logged out. This behavior persists even after system or browser restarts (GitHub Advisory). This vulnerability is related to a previously partially fixed issue (CVE-2023-44400) where logging out existing users after password changes was overlooked.

Technical details

The vulnerability is classified with a CVSS v3.1 base score of 7.8 (HIGH) by NIST and 6.7 (MEDIUM) by GitHub. The vulnerability is characterized by Local attack vector, Low attack complexity, High privileges required, and No user interaction needed. The vulnerability affects both the Docker images (louislam/dockge <= 1.3.2 and louislam/uptime-kuma <= 1.23.8) and npm package (louislam/uptime-kuma <= 1.23.8) (GitHub Advisory).

Impact

The vulnerability enables unauthorized access to user accounts after password changes, compromising the security of sensitive information. Previously logged-in users maintain their access rights, which could lead to unauthorized data access and manipulation of user accounts. This poses a significant threat to the integrity and confidentiality of the Uptime Kuma platform (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.23.9 of Uptime Kuma. The fix implements a server-side solution that emits a 'refresh' event and disconnects all clients except the one initiating the password change. Users are strongly recommended to upgrade to version 1.23.9 or later. For Docker users, version 1.3.3 of Dockge addresses this vulnerability (GitHub Advisory).

Community reactions

The vulnerability was initially reported as a bug report in a public issue tracker against the project's security policy. The Uptime Kuma team promptly responded by removing the public post and releasing a patch within three days of the initial discovery (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management