CVE-2024-7046:This is a vulnerability in open-webui/open-webui v0.3.8 that allows an attacker to view admin details due to improper access control.

splash
Back

Description Preview

CVE-2024-7046 is a medium-severity vulnerability that has been identified in open-webui/open-webui v0.3.8. The issue arises from improper access control which allows an attacker to view the details of the first admin (owner). The application does not verify whether the attacker is an administrator, thereby allowing the attacker to directly call the /api/v1/auths/admin/details interface to retrieve the first admin (owner) details. The attack complexity is low and requires no user interaction.

Overview

The vulnerability is due to an error in the access control mechanism of the open-webui/open-webui v0.3.8. This error allows an attacker to bypass the access control and view the details of the first admin (owner). The attack can be conducted over the network and requires low privileges. The impact of the vulnerability is a breach of confidentiality.

Remediation

Users of open-webui/open-webui v0.3.8 are advised to check for updates and apply patches as soon as they are available. It is also recommended to review and update the access control policies and ensure that only authorized users have access to sensitive information.

References

More information about this vulnerability can be found at: https://huntr.com/bounties/684185e4-6766-4638-b08a-0de9c2820aee

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  5. Construction
    Construction
  6. Educational Services
    Educational Services
  7. Finance and Insurance
    Finance and Insurance
  8. Health Care & Social Assistance
    Health Care & Social Assistance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background