CVE-2024-30896
InfluxDB vulnerability analysis and mitigation

Overview

InfluxDB OSS 2.x through 2.7.11 contains a business logic vulnerability that allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. The vulnerability was discovered and reported in March 2024, affecting only InfluxDB OSS 2.x versions, while InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated, and Clustered versions are not affected (NVD, GitHub Issue).

Technical details

The vulnerability stems from a business logic flaw where users with allAccess tokens can list all authorization tokens defined in the same organization, including operator tokens, through the 'influx auth ls' command or API endpoints. The issue occurs because allAccess tokens have unrestricted permissions to list all authorizations within their organization, regardless of token type. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 (Critical) with the vector string AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (NVD).

Impact

The vulnerability enables unauthorized access to the entire InfluxDB instance, potentially compromising the Confidentiality, Integrity, and Availability of data across different organizations. Since operator tokens possess administrative permissions, attackers can gain unrestricted access to the system, potentially affecting the availability and integrity of the entire InfluxDB instance (GitHub Issue).

Mitigation and workarounds

As a temporary mitigation, administrators should avoid granting users access to the default organization where operator tokens are automatically stored during setup. It is recommended to create multiple organizations and only grant users access to secondary organizations that do not contain operator tokens. Additionally, operators should avoid storing operator tokens in non-default organizations (GitHub Issue).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management