CVE-2023-36812: Remote Code Execution for 2.4.1 and earlier
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9932%
CWE
Published
6/30/2023
Updated
11/10/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| net.opentsdb:opentsdb | maven | <= 2.4.1 | 2.4.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient input validation in graph parameter handling functions. The pre-patch code in GraphHandler.java processed user-controlled parameters like 'wxh' and 'yrange' using regex checks that failed to prevent newlines/special characters. Attackers could inject Gnuplot commands via these parameters as they were written directly to config files executed by mygnuplot.sh/bat. The commit 07c4641 added validateString() checks to enforce ASCII printables, confirming these functions were the injection vectors.