Rapid7 Vulnerability & Exploit Database

OpenTSDB 2.4.0 unauthenticated command injection

Back to Search

OpenTSDB 2.4.0 unauthenticated command injection

Disclosed
11/18/2020
Created
12/23/2022

Description

This module exploits an unauthenticated command injection vulnerability in the yrange parameter in OpenTSDB through 2.4.0 (CVE-2020-35476) in order to achieve unauthenticated remote code execution as the root user. The module first attempts to obtain the OpenTSDB version via the api. If the version is 2.4.0 or lower, the module performs additional checks to obtain the configured metrics and aggregators. It then randomly selects one metric and one aggregator and uses those to instruct the target server to plot a graph. As part of this request, the yrange parameter is set to the payload, which will then be executed by the target if the latter is vulnerable. This module has been successfully tested against OpenTSDB version 2.3.0.

Author(s)

  • Shai rod
  • Erik Wynter

Platform

Linux,Unix

Architectures

cmd, x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/opentsdb_yrange_cmd_injection
msf exploit(opentsdb_yrange_cmd_injection) > show targets
    ...targets...
msf exploit(opentsdb_yrange_cmd_injection) > set TARGET < target-id >
msf exploit(opentsdb_yrange_cmd_injection) > show options
    ...show and set options...
msf exploit(opentsdb_yrange_cmd_injection) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;