Vulnerability Details : CVE-2023-25826
Public exploit exists!
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
Products affected by CVE-2023-25826
- cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-25826
83.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2023-25826
-
OpenTSDB 2.4.1 unauthenticated command injection
Disclosure Date: 2023-07-01First seen: 2023-09-11exploit/linux/http/opentsdb_key_cmd_injectionThis module exploits an unauthenticated command injection vulnerability in the key parameter in OpenTSDB through 2.4.1 (CVE-2023-36812/CVE-2023-25826) in order to achieve unauthenticated remote code execution as the root user. The module first atte
CVSS scores for CVE-2023-25826
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Synopsys | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-25826
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- disclosure@synopsys.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-25826
-
http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html
OpenTSDB 2.4.1 Unauthenticated Command Injection ≈ Packet Storm
-
https://www.synopsys.com/blogs/software-security/opentsdb/
CyRC Vulnerability Advisory: CVE-2023-25826 and CVE-2023-25827 in OpenTSDB | SynopsysThird Party Advisory
-
https://github.com/OpenTSDB/opentsdb/pull/2275
Improved fix for #2261. by manolama · Pull Request #2275 · OpenTSDB/opentsdb · GitHubPatch
Jump to