漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Remote Code Execution in OpenTSDB
Vulnerability Description
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
OpenTSDB 操作系统命令注入漏洞
Vulnerability Description
OpenTSDB是一套开源的、可扩展的分布式时间序列数据库。 OpenTSDB 1.0.0版本至2.4.1版本存在安全漏洞,该漏洞源于对参数验证不充分。攻击者利用该漏洞可以在主机系统上执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A