CVE-2023-25827

Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*

History

10 May 2023, 20:10

Type Values Removed Values Added
CWE CWE-79
CPE cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Opentsdb
Opentsdb opentsdb
References (MISC) https://github.com/OpenTSDB/opentsdb/pull/2274 - (MISC) https://github.com/OpenTSDB/opentsdb/pull/2274 - Patch
References (MISC) https://www.synopsys.com/blogs/software-security/opentsdb/ - (MISC) https://www.synopsys.com/blogs/software-security/opentsdb/ - Third Party Advisory

03 May 2023, 19:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-03 19:15

Updated : 2023-05-10 20:10


NVD link : CVE-2023-25827

Mitre link : CVE-2023-25827


JSON object : View

Products Affected

opentsdb

  • opentsdb
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')