Critical Security Vulnerabilities in OneUptime Probe Image 8.0.5410 #339

Closed
opened 2026-04-05 16:19:24 +02:00 by MrUnknownDE · 0 comments
Owner

Originally created by @listellm on 10/24/2025

oneuptime-probe-vuln-report.json

Summary

The OneUptime probe image (docker.io/oneuptime/probe:8.0.5410) contains 3,089 security vulnerabilities including 42 critical and 541 high severity issues.

Vulnerability Breakdown

  • Critical: 42
  • High: 541
  • Medium: 1,473
  • Low: 1,000
  • Unknown: 33

Critical Vulnerabilities (Sample)

1. CVE-2025-57807 - ImageMagick Heap Write Vulnerability

  • Package: imagemagick (8:6.9.11.60+dfsg-1.6+deb12u2)
  • Fix Available: Yes (8:6.9.11.60+dfsg-1.6+deb12u4)
  • Impact: Deterministic heap write allowing arbitrary memory corruption
  • Description: WriteBlob() function permits advancing stream offset beyond allocation bounds, producing deterministic heap write on 64-bit builds

2. CVE-2025-53014 - ImageMagick Heap Buffer Overflow

  • Package: imagemagick (8:6.9.11.60+dfsg-1.6+deb12u2)
  • Fix Available: No
  • Impact: Out-of-bounds memory access
  • Description: Off-by-one error in InterpretImageFilename causes heap buffer overflow when processing consecutive percent signs

3. CVE-2025-47917 - Mbed TLS Use-After-Free

  • Package: libmbedcrypto7 (2.28.3-1)
  • Fix Available: No
  • Impact: Use-after-free or double-free in X.509 certificate handling
  • Description: mbedtls_x509_string_to_names() performs unexpected deep free, causing dangling pointers

4. CVE-2025-9288 - sha.js Input Validation Vulnerability

  • Package: sha.js (2.4.11)
  • Fix Available: Yes (2.4.12)
  • Impact: Input data manipulation allowing cryptographic weaknesses
  • Description: Improper input validation in cryptographic hashing library

5. CVE-2025-7783 - form-data Insufficiently Random Values

  • Package: form-data (4.0.0)
  • Fix Available: Yes (4.0.4)
  • Impact: HTTP Parameter Pollution (HPP) attacks
  • Description: Use of insufficiently random values in boundary generation

6. CVE-2025-6965 - SQLite Memory Corruption

  • Package: libsqlite3-0 (3.40.1-2+deb12u1)
  • Fix Available: No
  • Impact: Memory corruption through aggregate terms
  • Description: Aggregate terms can exceed column count, leading to memory corruption

7. CVE-2024-38428 - wget URI Parsing Vulnerability

  • Package: wget (1.21.3-1+b1)
  • Fix Available: Yes (1.21.3-1+deb12u1)
  • Impact: Insecure URI handling allowing credential leakage
  • Description: Mishandles semicolons in userinfo subcomponent, causing data to be misinterpreted

8. CVE-2024-29415 & CVE-2023-42282 - node-ip SSRF Vulnerabilities

  • Package: node-ip (2.0.0+~1.1.0-1)
  • Fix Available: No
  • Impact: Server-Side Request Forgery (SSRF) attacks
  • Description: Improperly categorizes IP addresses (127.1, 01200034567, ::fFFf:127.0.0.1) as globally routable, allowing SSRF

9. CVE-2023-6879 - libaom Heap Overflow

  • Package: libaom3 (3.6.0-1+deb12u1)
  • Fix Available: No
  • Impact: Heap overflow in video encoding
  • Description: Resolution changes during multi-threaded encode cause heap overflow in av1_loop_restoration_dealloc()

10. CVE-2023-5841 - OpenEXR Heap Buffer Overflow

  • Package: libopenexr-3-1-30 (3.1.5-5)
  • Fix Available: No (fixed in upstream 3.1.12, 3.2.2)
  • Impact: Heap buffer overflow in image parsing
  • Description: Failure to validate scanline samples in deep scanline data

Recommendations

Immediate Actions Required

  1. Upgrade base image to latest Debian 12 (bookworm) with security patches
  2. Update critical packages:
    • imagemagick → 8:6.9.11.60+dfsg-1.6+deb12u4
    • wget → 1.21.3-1+deb12u1
    • sha.js → 2.4.12
    • form-data → 4.0.4
  3. Replace vulnerable Node.js packages:
    • node-ip → Update or replace with safer IP validation library
  4. Consider removing unnecessary packages

Scan Details

  • Scanner: Trivy v0.65.0 (Aqua Security)
  • Scan Date: 2025-10-24
  • Image: docker.io/oneuptime/probe:8.0.5410
  • Image Digest: sha256:3c006d8e3534bef1a59aeff52417956e9e9058510e7f50591a3d20664f934de2
  • Full Report: See attached JSON file
*Originally created by @listellm on 10/24/2025* [oneuptime-probe-vuln-report.json](https://github.com/user-attachments/files/23121844/oneuptime-probe-vuln-report.json) ## Summary The OneUptime probe image (`docker.io/oneuptime/probe:8.0.5410`) contains **3,089 security vulnerabilities** including **42 critical** and **541 high** severity issues. ## Vulnerability Breakdown - **Critical**: 42 - **High**: 541 - **Medium**: 1,473 - **Low**: 1,000 - **Unknown**: 33 ## Critical Vulnerabilities (Sample) ### 1. CVE-2025-57807 - ImageMagick Heap Write Vulnerability - **Package**: `imagemagick` (8:6.9.11.60+dfsg-1.6+deb12u2) - **Fix Available**: Yes (8:6.9.11.60+dfsg-1.6+deb12u4) - **Impact**: Deterministic heap write allowing arbitrary memory corruption - **Description**: WriteBlob() function permits advancing stream offset beyond allocation bounds, producing deterministic heap write on 64-bit builds ### 2. CVE-2025-53014 - ImageMagick Heap Buffer Overflow - **Package**: `imagemagick` (8:6.9.11.60+dfsg-1.6+deb12u2) - **Fix Available**: No - **Impact**: Out-of-bounds memory access - **Description**: Off-by-one error in InterpretImageFilename causes heap buffer overflow when processing consecutive percent signs ### 3. CVE-2025-47917 - Mbed TLS Use-After-Free - **Package**: `libmbedcrypto7` (2.28.3-1) - **Fix Available**: No - **Impact**: Use-after-free or double-free in X.509 certificate handling - **Description**: mbedtls_x509_string_to_names() performs unexpected deep free, causing dangling pointers ### 4. CVE-2025-9288 - sha.js Input Validation Vulnerability - **Package**: `sha.js` (2.4.11) - **Fix Available**: Yes (2.4.12) - **Impact**: Input data manipulation allowing cryptographic weaknesses - **Description**: Improper input validation in cryptographic hashing library ### 5. CVE-2025-7783 - form-data Insufficiently Random Values - **Package**: `form-data` (4.0.0) - **Fix Available**: Yes (4.0.4) - **Impact**: HTTP Parameter Pollution (HPP) attacks - **Description**: Use of insufficiently random values in boundary generation ### 6. CVE-2025-6965 - SQLite Memory Corruption - **Package**: `libsqlite3-0` (3.40.1-2+deb12u1) - **Fix Available**: No - **Impact**: Memory corruption through aggregate terms - **Description**: Aggregate terms can exceed column count, leading to memory corruption ### 7. CVE-2024-38428 - wget URI Parsing Vulnerability - **Package**: `wget` (1.21.3-1+b1) - **Fix Available**: Yes (1.21.3-1+deb12u1) - **Impact**: Insecure URI handling allowing credential leakage - **Description**: Mishandles semicolons in userinfo subcomponent, causing data to be misinterpreted ### 8. CVE-2024-29415 & CVE-2023-42282 - node-ip SSRF Vulnerabilities - **Package**: `node-ip` (2.0.0+~1.1.0-1) - **Fix Available**: No - **Impact**: Server-Side Request Forgery (SSRF) attacks - **Description**: Improperly categorizes IP addresses (127.1, 01200034567, ::fFFf:127.0.0.1) as globally routable, allowing SSRF ### 9. CVE-2023-6879 - libaom Heap Overflow - **Package**: `libaom3` (3.6.0-1+deb12u1) - **Fix Available**: No - **Impact**: Heap overflow in video encoding - **Description**: Resolution changes during multi-threaded encode cause heap overflow in av1_loop_restoration_dealloc() ### 10. CVE-2023-5841 - OpenEXR Heap Buffer Overflow - **Package**: `libopenexr-3-1-30` (3.1.5-5) - **Fix Available**: No (fixed in upstream 3.1.12, 3.2.2) - **Impact**: Heap buffer overflow in image parsing - **Description**: Failure to validate scanline samples in deep scanline data ## Recommendations ### Immediate Actions Required 1. **Upgrade base image** to latest Debian 12 (bookworm) with security patches 2. **Update critical packages**: - `imagemagick` → 8:6.9.11.60+dfsg-1.6+deb12u4 - `wget` → 1.21.3-1+deb12u1 - `sha.js` → 2.4.12 - `form-data` → 4.0.4 3. **Replace vulnerable Node.js packages**: - `node-ip` → Update or replace with safer IP validation library 4. **Consider removing unnecessary packages** ## Scan Details - **Scanner**: Trivy v0.65.0 (Aqua Security) - **Scan Date**: 2025-10-24 - **Image**: `docker.io/oneuptime/probe:8.0.5410` - **Image Digest**: `sha256:3c006d8e3534bef1a59aeff52417956e9e9058510e7f50591a3d20664f934de2` - **Full Report**: See attached JSON file
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github/oneuptime#339