跳转到帖子

OpenTSDB 2.4.1 unauthenticated command injection

recommended_posts

发布于
  • Members

OpenTSDB 2.4.1 unauthenticated command injection

Disclosed
07/01/2023
Created
09/08/2023

Description

This module exploits an unauthenticated command injection vulnerability in the key parameter in OpenTSDB through 2.4.1 (CVE-2023-36812/CVE-2023-25826) in order to achieve unauthenticated remote code execution as the root user. The module first attempts to obtain the OpenTSDB version via the api. If the version is 2.4.1 or lower, the module performs additional checks to obtain the configured metrics and aggregators. It then randomly selects one metric and one aggregator and uses those to instruct the target server to plot a graph. As part of this request, the key parameter is set to the payload, which will then be executed by the target if the latter is vulnerable. This module has been successfully tested against OpenTSDB version 2.4.1.

Author(s)

  • Gal Goldstein
  • Daniel Abeles
  • Erik Wynter

Platform

Linux

Architectures

ARCH_CMD

Development

  • Source Code
  • History
  • 查看数 698
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…