CVE-2018-13003: OpenTSDB Cross-site Scripting vulnerability
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39044%
CWE
Published
5/14/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| net.opentsdb:opentsdb | maven | <= 2.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the /suggest endpoint's handling of the 'type' parameter. In Java servlet-based architectures like OpenTSDB, HTTP endpoints are typically handled by servlet classes. The SuggestServlet's doGet method would be responsible for processing the 'type' parameter from the request. Since the advisory explicitly mentions XSS via the 'type' parameter, this indicates the input was not properly sanitized before being included in HTML output. While no exact code is shown, the architectural pattern and vulnerability description strongly suggest the doGet method in SuggestServlet is the vulnerable entry point.