Vulnerability Details CVE-2023-36812
OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. This issue has been patched in commit `07c4641471c` and further refined in commit `fa88d3e4b`. These patches are available in the `2.4.2` release. Users are advised to upgrade. User unable to upgrade may disable Gunuplot via the config option`tsd.core.enable_ui = true` and remove the shell files `mygnuplot.bat` and `mygnuplot.sh`.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.834
EPSS Ranking 99.2%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2023-36812
-
cpe:2.3:a:opentsdb:opentsdb:1.0.0
-
cpe:2.3:a:opentsdb:opentsdb:1.1.0
-
cpe:2.3:a:opentsdb:opentsdb:2.0.0
-
cpe:2.3:a:opentsdb:opentsdb:2.0.1
-
cpe:2.3:a:opentsdb:opentsdb:2.1.0
-
cpe:2.3:a:opentsdb:opentsdb:2.1.1
-
cpe:2.3:a:opentsdb:opentsdb:2.1.2
-
cpe:2.3:a:opentsdb:opentsdb:2.1.3
-
cpe:2.3:a:opentsdb:opentsdb:2.1.4
-
cpe:2.3:a:opentsdb:opentsdb:2.2.0
-
cpe:2.3:a:opentsdb:opentsdb:2.2.1
-
cpe:2.3:a:opentsdb:opentsdb:2.2.2
-
cpe:2.3:a:opentsdb:opentsdb:2.3.0
-
cpe:2.3:a:opentsdb:opentsdb:2.3.1
-
cpe:2.3:a:opentsdb:opentsdb:2.3.2
-
cpe:2.3:a:opentsdb:opentsdb:2.4.0
-
cpe:2.3:a:opentsdb:opentsdb:2.4.1