Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh2NTMtcTc2Yy03Zjhj

OS Command Injection in OpenTSDB

A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)

Permalink: https://github.com/advisories/GHSA-hv53-q76c-7f8c
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh2NTMtcTc2Yy03Zjhj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-hv53-q76c-7f8c, CVE-2020-35476
References: Repository: https://github.com/OpenTSDB/opentsdb
Blast Radius: 22.0

Affected Packages

maven:net.opentsdb:opentsdb
Dependent packages: 4
Dependent repositories: 175
Downloads:
Affected Version Ranges: <= 2.4.0
No known fixed version
All affected versions: 2.1.3, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.3.2, 2.4.0