Miggo Logo

CVE-2018-13003: OpenTSDB Cross-site Scripting vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.39044%
Published
5/14/2022
Updated
2/2/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.opentsdb:opentsdbmaven<= 2.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in the /suggest endpoint's handling of the 'type' parameter. In Java servlet-based architectures like OpenTSDB, HTTP endpoints are typically handled by servlet classes. The SuggestServlet's doGet method would be responsible for processing the 'type' parameter from the request. Since the advisory explicitly mentions XSS via the 'type' parameter, this indicates the input was not properly sanitized before being included in HTML output. While no exact code is shown, the architectural pattern and vulnerability description strongly suggest the doGet method in SuggestServlet is the vulnerable entry point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in Op*nTS** *.*.*. T**r* is XSS in p*r*m*t*r `typ*` to t** /su***st URI.

Reasoning

T** vuln*r**ility *xists in t** /su***st *n*point's **n*lin* o* t** 'typ*' p*r*m*t*r. In J*v* s*rvl*t-**s** *r**it**tur*s lik* Op*nTS**, *TTP *n*points *r* typi**lly **n*l** *y s*rvl*t *l*ss*s. T** `Su***stS*rvl*t`'s `*o**t` m*t*o* woul* ** r*sponsi*