CVE-2023-25827
Summary
| CVE | CVE-2023-25827 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-03 19:15:00 UTC |
| Updated | 2023-05-10 20:10:00 UTC |
| Description | Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix for #2269 and #2267 XSS vulnerability. by manolama · Pull Request #2274 · OpenTSDB/opentsdb · GitHub | MISC | github.com | |
| CyRC Vulnerability Advisory: CVE-2023-25826 and CVE-2023-25827 in OpenTSDB | Synopsys | MISC | www.synopsys.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.