An issue was discovered in Netdata 1.10.0. JSON injection exists via the api/v1/data tqx parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L388 | third party advisory exploit |
https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L403 | third party advisory exploit |
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | third party advisory patch |
https://github.com/netdata/netdata/pull/4521 | third party advisory |
https://www.red4sec.com/cve/netdata_json_injection.txt | third party advisory |