A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
Published 2020-12-16 08:15:14
Updated 2023-03-03 15:34:17
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2020-35476

Exploit prediction scoring system (EPSS) score for CVE-2020-35476

93.68%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2020-35476

  • OpenTSDB 2.4.0 unauthenticated command injection
    Disclosure Date: 2020-11-18
    First seen: 2023-09-11
    exploit/linux/http/opentsdb_yrange_cmd_injection
    This module exploits an unauthenticated command injection vulnerability in the yrange parameter in OpenTSDB through 2.4.0 (CVE-2020-35476) in order to achieve unauthenticated remote code execution as the root user. The module first attempts to obta

CVSS scores for CVE-2020-35476

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2020-35476

References for CVE-2020-35476

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!