Categories: Cyber Security News

OneUptime Command Injection Flaw Enables Full Server Takeover

A critical command injection vulnerability in OneUptime, a popular platform for monitoring online services, lets authenticated users hijack Probe servers.

Tracked as CVE-2026-27728, this flaw risks complete system compromise for organizations relying on versions before 10.0.7.

Security firm SentinelOne disclosed the issue, urging immediate patching to block remote code execution (RCE).

Vulnerability Breakdown

The problem hides in OneUptime’s Probe Server component, specifically the NetworkPathMonitor.performTraceroute() function.

Vulnerability Details (Source: SentinelOne)

This handles traceroute operations using user-supplied “destination” inputs from monitor configs. The code calls Node.js’s child_process.exec(), which runs commands in a shell.

Shells parse metacharacters like ;, |, &, $(), and backticks, letting attackers escape the traceroute and inject malicious commands.

Any authenticated project user, even with basic permissions, can exploit it. They craft a monitor with a poisoned destination, such as example.com; cat /etc/passwd or $(whoami).

When the Probe processes it, the extra commands run with server privileges, enabling data theft, lateral movement, or full takeover.

Sponsored
CVE Detail Description
CVE ID CVE-2026-27728
CVSS Score 9.1 (Critical)
Affected Component OneUptime Probe Server (NetworkPathMonitor.performTraceroute())

Attackers need only project access. They set a malicious monitor config, trigger the traceroute, and execute OS commands.

Outcomes include dumping sensitive files, installing malware, or pivoting to other systems. Probe servers often run with elevated privileges, amplifying damage in enterprise setups.

OneUptime fixed it in version 10.0.7 by swapping exec() for execFile(). This runs binaries directly with argument arrays, dodging shell interpretation and metacharacter abuse. No shell means no injection.

Mitigation Steps

  • Patch Now: Update to 10.0.7 or later.
  • Audit Monitors: Scan configs for odd destinations with special chars.
  • Monitor Activity: Log for rogue processes, odd connections, or file changes on Probes.
  • Workarounds: Isolate Probes, restrict user perms, limit network access if patching delays.

Organizations using OneUptime for uptime monitoring face high risks from insider or compromised low-priv accounts. Act fast to secure infrastructure.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post OneUptime Command Injection Flaw Enables Full Server Takeover appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

US and Israeli Attacks on Iran Violate International Law

THE HAGUE, Netherlands (AP) — As U.S. and Israeli forces pounded Iran, and Tehran and its…

1 hour ago

Only 1 in 4 Americans Support Trump’s War on Iran, Reuters/Ipsos Poll Shows

Americans don’t trust President Donald Trump when it comes to foreign policy, a Reuters/Ipsos poll…

1 hour ago

The $9 Joyroom Car Adapter Adds Wireless Bluetooth Audio and USB Charging Ports to Your Old Car

If you own an old car without Bluetooth and you're looking for a cheap and…

1 hour ago

Alienware Still Has One of the Lowest Prices on an RTX 5080 Equipped Prebuilt Gaming PC

2026 has already seen surges in the cost of RAM and GPUs. Unfortunately, this also…

1 hour ago

Iran war drives gas price uncertainty ahead of busy summer season

A gas pump is seen in a vehicle on Nov. 26, 2025, in Austin, Texas.…

2 hours ago

Iran war drives gas price uncertainty ahead of busy summer season

A gas pump is seen in a vehicle on Nov. 26, 2025, in Austin, Texas.…

2 hours ago

This website uses cookies.