Description
An issue was discovered in OpenTSDB 2.3.0. Many parameters to the /q URI can execute commands, including o, key, style, and yrange and y2range and their JSON input.
Remediation
References
https://github.com/OpenTSDB/opentsdb/issues/1239
Related Vulnerabilities
CVE-2012-0392 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2020-13934 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-6002 Vulnerability in maven package com.linecorp.centraldogma:centraldogma-server
CVE-2018-16487 Vulnerability in npm package lodash.mergewith