[GHSA-cx2v-jrjc-g54w] OpenTSDB vulnerable to OS Command Injection
Updates
- Affected products
- References
Comments
Add a patch https://github.com/OpenTSDB/opentsdb/commit/a6a9ec4bc8a526951bc25bb19a145782bafaa8b0, of which the commit message claims Avoid double computing the expressions for the /query/exp endpoint. Also make sure both versions of next() handle booleans. Signed-off-by: Chris Larsen <[email protected]>
Hey @MarkLee131, are you sure this resolves this issue? The backing issue is still open https://github.com/OpenTSDB/opentsdb/issues/1239
👋 This pull request has been marked as stale because it has been open with no activity. You can: comment on the issue or remove the stale label to hold stale off for a while, add the Keep label to hold stale off permanently, or do nothing. If you do nothing this pull request will be closed eventually by the stale bot. Please see CONTRIBUTING.md for more policy details.