CVE-2020-35476

A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written...

Basic Information

CVE State
PUBLISHED
Reserved Date
December 16, 2020
Published Date
December 16, 2020
Last Updated
August 04, 2024
Vendor
OpenTSDB
Product
OpenTSDB
Description
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
Tags
nuclei_scanner metasploit_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
93.36% (Percentile: 99.80%) as of 2025-06-14

Exploit Status

Exploited in the Wild
Yes (2025-05-18 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-18 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

opentsdb_yrange_cmd_injection

Type: metasploit • Created: Unknown

Metasploit module for CVE-2020-35476

glowbase/CVE-2020-35476

Type: github • Created: 2022-01-30 05:09:07 UTC • Stars: 2

A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter.

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Detected by Metasploit

  • Added to KEVIntel