github.com/influxdata/kapacitor is vulnerable to Remote Code Execution (RCE)
91
Critical Risk
Affected versions of this package are vulnerable to remote code execution (RCE) due to improper enforcement of disabled alert handlers in TICKscript processing. The affected logic allows scripts to invoke alert handler methods such as .exec(), .log(), or .tcp() directly even when corresponding handlers are configured as disabled via command-line restrictions. An attacker able to create or modify TICKscripts can bypass administrative security controls and execute unauthorized commands or trigger unintended outbound actions on the host system.
You are affected if you are using a version that falls within the vulnerable range.
github.com/influxdata/kapacitor is vulnerable to Remote Code Execution (RCE) in versions 0.0.1 - 1.8.3.
Upgrade the github.com/influxdata/kapacitor library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant