Description
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hv53-q76c-7f8c | OS Command Injection in OpenTSDB |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T17:02:08.232Z
Reserved: 2020-12-16T00:00:00.000Z
Link: CVE-2020-35476
No data.
Status : Modified
Published: 2020-12-16T08:15:13.560
Modified: 2024-11-21T05:27:22.250
Link: CVE-2020-35476
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA