CVE-2023-36812
CRITICALOpenTSDB - RCE
Title source: llmDescription
OpenTSDB is a open source, distributed, scalable Time Series Database (TSDB). OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. This issue has been patched in commit `07c4641471c` and further refined in commit `fa88d3e4b`. These patches are available in the `2.4.2` release. Users are advised to upgrade. User unable to upgrade may disable Gunuplot via the config option`tsd.core.enable_ui = true` and remove the shell files `mygnuplot.bat` and `mygnuplot.sh`.
Exploits (2)
nomisec
WORKING POC
7 stars
by ErikWynter · poc
https://github.com/ErikWynter/opentsdb_key_cmd_injection
metasploit
WORKING POC
EXCELLENT
by Gal Goldstein, Daniel Abeles, Erik Wynter · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/opentsdb_key_cmd_injection.rb
References (4)
Scores
CVSS v3
9.8
EPSS
0.8429
EPSS Percentile
99.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-74
Status
published
Products (2)
net.opentsdb/opentsdb
0 - 2.4.2Maven
opentsdb/opentsdb
< 2.4.2
Published
Jun 30, 2023
Tracked Since
Feb 18, 2026