Miggo Logo

CVE-2023-36812: Remote Code Execution for 2.4.1 and earlier

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.9932%
Published
6/30/2023
Updated
11/10/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.opentsdb:opentsdbmaven<= 2.4.12.4.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient input validation in graph parameter handling functions. The pre-patch code in GraphHandler.java processed user-controlled parameters like 'wxh' and 'yrange' using regex checks that failed to prevent newlines/special characters. Attackers could inject Gnuplot commands via these parameters as they were written directly to config files executed by mygnuplot.sh/bat. The commit 07c4641 added validateString() checks to enforce ASCII printables, confirming these functions were the injection vectors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Op*nTS** is vuln*r**l* to R*mot* *o** *x**ution vuln*r**ility *y writin* us*r-*ontroll** input to *nuplot *on*i*ur*tion *il* *n* runnin* *nuplot wit* t** **n*r*t** *on*i*ur*tion. ### P*t***s P*t**** in [***********************************

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt input v*li**tion in *r*p* p*r*m*t*r **n*lin* *un*tions. T** pr*-p*t** *o** in *r*p***n*l*r.j*v* pro**ss** us*r-*ontroll** p*r*m*t*rs lik* 'wx*' *n* 'yr*n**' usin* r***x ****ks t**t **il** to pr*v*nt n*wlin*s/