.. / CVE-2020-35476

Exploit for OpenTSDB <= 2.4.0 - Remote Code Execution (CVE-2020-35476)

Description:

OpenTSDB 2.4.0 and earlier is susceptible to remote code execution via the yrange parameter written to a gnuplot file in the /tmp directory. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2020-35476.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-35476.yaml
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box AdmirerToo Go to Practice

References:

https://github.com/OpenTSDB/opentsdb/issues/2051
https://nvd.nist.gov/vuln/detail/CVE-2020-35476
http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html