CVE-2023-25827
Published May 3, 2023
Last updated 2 years ago
Overview
- Description
- Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
- Source
- disclosure@synopsys.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E984EFF-2943-4915-83B4-A5D7136D967C", "versionEndIncluding": "2.4.1", "versionStartIncluding": "1.0.0" } ], "operator": "OR" } ] } ]