Vulnerability Details : CVE-2020-35476

A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the shell script. (tsd/ attempted to prevent command injections by blocking backticks but this is insufficient.)
Vulnerability category: Execute code
Published 2020-12-16 08:15:14
Updated 2023-03-03 15:34:17
Source MITRE
View at NVD,
Public exploit exists!

Exploit prediction scoring system (EPSS) score for CVE-2020-35476

Probability of exploitation activity in the next 30 days: 95.74%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2020-35476

  • OpenTSDB 2.4.0 unauthenticated command injection
    Disclosure Date: 2020-11-18
    First seen: 2023-09-11
    This module exploits an unauthenticated command injection vulnerability in the yrange parameter in OpenTSDB through 2.4.0 (CVE-2020-35476) in order to achieve unauthenticated remote code execution as the root user. The module first attempts to obta

CVSS scores for CVE-2020-35476

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source

CWE ids for CVE-2020-35476

References for CVE-2020-35476

Products affected by CVE-2020-35476

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to terms of use!