← Volver a CVEs
CVE-2023-25826
CRITICAL9.8
Descripcion
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/3/2023
Ultima modificacion2/13/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
opentsdb:opentsdb
Debilidades (CWE)
CWE-78CWE-78
Referencias
http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html(disclosure@synopsys.com)
https://github.com/OpenTSDB/opentsdb/pull/2275(disclosure@synopsys.com)
https://www.synopsys.com/blogs/software-security/opentsdb/(disclosure@synopsys.com)
http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/OpenTSDB/opentsdb/pull/2275(af854a3a-2127-422b-91ae-364da2661108)
https://www.synopsys.com/blogs/software-security/opentsdb/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.