Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1514 | Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint. |
Github GHSA |
GHSA-9chv-3w6c-jq9w | Cross Site Scripting in OpenTSDB |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 12 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: SNPS
Published:
Updated: 2025-02-12T16:23:41.269Z
Reserved: 2023-02-15T17:57:02.191Z
Link: CVE-2023-25827
Updated: 2024-08-02T11:32:12.535Z
Status : Modified
Published: 2023-05-03T19:15:10.297
Modified: 2024-11-21T07:50:16.810
Link: CVE-2023-25827
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA