CVE-2023-36812 |
|
Critical |
Jun 30, 2023 |
OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing
more...
OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. This issue has been patched in commit `07c4641471c` and further refined in commit `fa88d3e4b`. These patches are available in the `2.4.2` release. Users are advised to upgrade. User unable to upgrade may disable Gunuplot via the config option`tsd.core.enable_ui = true` and remove the shell files `mygnuplot.bat` and `mygnuplot.sh`.
less...
|
2.4.1, 2.4.0, 2.3.2, 2.3.1, 2.3.0, 2.2.2, 2.2.1, 2.2.0, 2.1.4, 1.0.0
|
CVE-2023-25827 |
BDSA-2023-1056 |
Medium |
May 03, 2023 |
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inje
more...
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
less...
|
2.4.1, 2.4.0, 2.3.2, 2.3.1, 2.3.0, 2.2.2, 2.2.1, 2.2.0, 2.1.4, 1.0.0
|
CVE-2023-25826 |
BDSA-2023-1057 |
Critical |
May 03, 2023 |
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameter
more...
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
less...
|
2.4.1, 2.4.0, 2.3.2, 2.3.1, 2.3.0, 2.2.2, 2.2.1, 2.2.0, 2.1.4, 1.0.0
|
BDSA-2020-3800 |
|
High |
Dec 16, 2020 |
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating
more...
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating graph plots. This could allow an attacker to inject and execute malicious system commands on the OpenTSDB host system.
**Note**: this vulnerability received incomplete fixes under the following disclosures:
* **BDSA-2016-1116**
* **CVE-2018-12972** (**BDSA-2018-2270**)
* **CVE-2020-35476** (**BDSA-2020-3800**)
The vulnerability was fully resolved and disclosed under (**CVE-2023-25826**) (**BDSA-2023-1057**).
less...
|
|
BDSA-2018-2270 |
|
High |
Jul 17, 2018 |
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating
more...
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating graph plots. This could allow an attacker to inject and execute malicious system commands on the OpenTSDB host system.
**Note**: this vulnerability received incomplete fixes under the following disclosures:
* **BDSA-2016-1116**
* **CVE-2018-12972** (**BDSA-2018-2270**)
* **CVE-2020-35476** (**BDSA-2020-3800**)
The vulnerability was fully resolved and disclosed under (**CVE-2023-25826**) (**BDSA-2023-1057**).
less...
|
|
BDSA-2018-2266 |
|
High |
Jul 17, 2018 |
OpenTSDB is vulnerable to reflected cross-site scripting (XSS) due to improper validation of user input supplied to the HTTP legacy query API. By trick
more...
OpenTSDB is vulnerable to reflected cross-site scripting (XSS) due to improper validation of user input supplied to the HTTP legacy query API. By tricking a victim into accessing a crafted URL, this could allow an attacker to inject malicious web scripts and steal sensitive information such as authentication tokens and session cookies.
**Note**: this issue shares the same root cause as, and was resolved by **CVE-2023-25827** (**BDSA-2023-1056**).
less...
|
|
BDSA-2018-2082 |
|
High |
Jul 03, 2018 |
OpenTSDB is vulnerable to reflected cross-site scripting (XSS) due to improper validation of user input supplied to the suggestion endpoint. By trickin
more...
OpenTSDB is vulnerable to reflected cross-site scripting (XSS) due to improper validation of user input supplied to the suggestion endpoint. By tricking a victim into accessing a crafted URL, this could allow an attacker to inject malicious web scripts and steal sensitive information such as authentication tokens and session cookies.
**Note**: this issue shares the same root cause as, and was resolved by **CVE-2023-25827** (**BDSA-2023-1056**).
less...
|
|
BDSA-2016-1116 |
|
High |
Dec 05, 2017 |
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating
more...
OpenTSDB is vulnerable to remote code execution (RCE) due to insufficient validation of parameters passed to the legacy HTTP query API when generating graph plots. This could allow an attacker to inject and execute malicious system commands on the OpenTSDB host system.
**Note**: this vulnerability received incomplete fixes under the following disclosures:
* **BDSA-2016-1116**
* **CVE-2018-12972** (**BDSA-2018-2270**)
* **CVE-2020-35476** (**BDSA-2020-3800**)
The vulnerability was fully resolved and disclosed under (**CVE-2023-25826**) (**BDSA-2023-1057**).
less...
|
|