Description
OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. This issue has been patched in commit `07c4641471c` and further refined in commit `fa88d3e4b`. These patches are available in the `2.4.2` release. Users are advised to upgrade. User unable to upgrade may disable Gunuplot via the config option`tsd.core.enable_ui = true` and remove the shell files `mygnuplot.bat` and `mygnuplot.sh`.
Published: 2023-06-30
Score: 9.8 Critical
EPSS: 84.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-76f7-9v52-v2fw Remote Code Execution for 2.4.1 and earlier
History

Wed, 06 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Opentsdb Opentsdb
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-13T16:56:26.038Z

Reserved: 2023-06-27T15:43:18.383Z

Link: CVE-2023-36812

cve-icon Vulnrichment

Updated: 2024-08-02T17:01:09.433Z

cve-icon NVD

Status : Modified

Published: 2023-06-30T23:15:10.287

Modified: 2024-11-21T08:10:38.957

Link: CVE-2023-36812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses