Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
References
Configurations
History
10 May 2023, 19:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/OpenTSDB/opentsdb/pull/2275 - Patch | |
References | (MISC) https://www.synopsys.com/blogs/software-security/opentsdb/ - Third Party Advisory | |
CPE | cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:* | |
CWE | CWE-78 |
03 May 2023, 19:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-03 19:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-25826
Mitre link : CVE-2023-25826
CVE.ORG link : CVE-2023-25826
JSON object : View
Products Affected
opentsdb
- opentsdb
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')