Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1514 | Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint. |
Github GHSA |
GHSA-9chv-3w6c-jq9w | Cross Site Scripting in OpenTSDB |
Wed, 12 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: SNPS
Published:
Updated: 2025-02-12T16:23:41.269Z
Reserved: 2023-02-15T17:57:02.191Z
Link: CVE-2023-25827
Updated: 2024-08-02T11:32:12.535Z
Status : Modified
Published: 2023-05-03T19:15:10.297
Modified: 2024-11-21T07:50:16.810
Link: CVE-2023-25827
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA