CVE-2023-25827

Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*

History

10 May 2023, 20:10

Type Values Removed Values Added
References (MISC) https://github.com/OpenTSDB/opentsdb/pull/2274 - (MISC) https://github.com/OpenTSDB/opentsdb/pull/2274 - Patch
References (MISC) https://www.synopsys.com/blogs/software-security/opentsdb/ - (MISC) https://www.synopsys.com/blogs/software-security/opentsdb/ - Third Party Advisory
CPE cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79

03 May 2023, 19:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-03 19:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-25827

Mitre link : CVE-2023-25827

CVE.ORG link : CVE-2023-25827


JSON object : View

Products Affected

opentsdb

  • opentsdb
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')