A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
- http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html
- https://github.com/OpenTSDB/opentsdb/issues/2051
- https://github.com/0ps/pocassistdb
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Addy-shetty/Laazy_sqli-labs
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/ErikWynter/opentsdb_key_cmd_injection
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/JD2344/SecGen_Exploits
- https://github.com/Live-Hack-CVE/CVE-2020-35476
- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
- https://github.com/Loginsoft-Research/Linux-Exploit-Detection
- https://github.com/StarCrossPortal/scalpel
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Wala-Alnozmai/SVD-Benchmark
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/apit-review-account/apit-tool
- https://github.com/assetnote/blind-ssrf-chains
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/getdrive/PoC
- https://github.com/glowbase/CVE-2020-35476
- https://github.com/huimzjty/vulwiki
- https://github.com/jweny/pocassistdb
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oananbeh/LLM-Java-SVR-Benchmark
- https://github.com/sobinge/nuclei-templates
- https://github.com/tzwlhack/Vulnerability
- https://github.com/youcans896768/APIV_Tool