{"id":"CVE-2020-35476","details":"A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)","aliases":["GHSA-hv53-q76c-7f8c"],"modified":"2026-04-11T23:13:59.989040Z","published":"2020-12-16T08:15:13.560Z","references":[{"type":"REPORT","url":"https://github.com/OpenTSDB/opentsdb/issues/2051"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opentsdb/opentsdb","events":[{"introduced":"0"},{"last_affected":"14ab3ef8a865816cf920aa69f2e019b7261a7847"}],"database_specific":{"cpe":"cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.4.0"}],"source":"CPE_FIELD"}}],"versions":["2.1.1","v1.0.0","v1.1.0","v2.0.1","v2.1.0","v2.1.2","v2.1.3","v2.1.4","v2.2.0","v2.2.1","v2.2.2","v2.3.0","v2.3.1","v2.3.2","v2.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35476.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}