Vulnerability Details CVE-2023-25827
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 52.3%
CVSS Severity
CVSS v3 Score 8.2
Products affected by CVE-2023-25827
-
cpe:2.3:a:opentsdb:opentsdb:1.0.0
-
cpe:2.3:a:opentsdb:opentsdb:1.1.0
-
cpe:2.3:a:opentsdb:opentsdb:2.0.0
-
cpe:2.3:a:opentsdb:opentsdb:2.0.1
-
cpe:2.3:a:opentsdb:opentsdb:2.1.0
-
cpe:2.3:a:opentsdb:opentsdb:2.1.1
-
cpe:2.3:a:opentsdb:opentsdb:2.1.2
-
cpe:2.3:a:opentsdb:opentsdb:2.1.3
-
cpe:2.3:a:opentsdb:opentsdb:2.1.4
-
cpe:2.3:a:opentsdb:opentsdb:2.2.0
-
cpe:2.3:a:opentsdb:opentsdb:2.2.1
-
cpe:2.3:a:opentsdb:opentsdb:2.2.2
-
cpe:2.3:a:opentsdb:opentsdb:2.3.0
-
cpe:2.3:a:opentsdb:opentsdb:2.3.1
-
cpe:2.3:a:opentsdb:opentsdb:2.3.2
-
cpe:2.3:a:opentsdb:opentsdb:2.4.0
-
cpe:2.3:a:opentsdb:opentsdb:2.4.1