Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35476 PoC — OpenTSDB 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:OpenTSDB 操作系统命令注入漏洞 (CVE-2020-35476)
Description:OpenTSDB是一套开源的、可扩展的分布式时间序列数据库。 OpenTSDB through 2.4.0版本存在操作系统命令注入漏洞,该漏洞源于远程代码执行漏洞通过yrange参数中的命令注入,yrange值被写入tmp目录中的gnuplot文件中。然后通过mygnupload .sh shell脚本执行该文件。
Description
OpenTSDB 2.4.0 and earlier is susceptible to remote code execution via the yrange parameter written to a gnuplot file in the /tmp directory. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
File Snapshot

id: CVE-2020-35476 info: name: OpenTSDB <=2.4.0 - Remote Code Execution author: pikpikcu seve ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.