Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh2NTMtcTc2Yy03Zjhj
OS Command Injection in OpenTSDB
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
Permalink: https://github.com/advisories/GHSA-hv53-q76c-7f8cJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWh2NTMtcTc2Yy03Zjhj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-hv53-q76c-7f8c, CVE-2020-35476
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-35476
- https://github.com/OpenTSDB/opentsdb/issues/2051
- http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html
- https://github.com/advisories/GHSA-hv53-q76c-7f8c
Blast Radius: 22.0
Affected Packages
maven:net.opentsdb:opentsdb
Dependent packages: 4Dependent repositories: 175
Downloads:
Affected Version Ranges: <= 2.4.0
No known fixed version
All affected versions: 2.1.3, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.3.2, 2.4.0