Command Injection Affecting net.opentsdb:opentsdb package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-NETOPENTSDB-5496958
  • published4 May 2023
  • disclosed4 May 2023
  • creditJamie Harris

Introduced: 4 May 2023

CVE-2023-25826  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

net.opentsdb:opentsdb is a scalable, distributed Time Series Database.

Affected versions of this package are vulnerable to Command Injection due to insufficient validation of parameters passed to the legacy HTTP query API.

Note: This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.

CVSS Scores

version 3.1