MEDIUM
The vulnerability is rated MEDIUM because it requires specific conditions, such as the use of untrusted CSV files or databases. The real-world exploitability depends on how Otava integrates with external data sources and whether input validation has been implemented by users.

Apache Otava is vulnerable due to improper input validation, potentially allowing attackers to inject malicious data through CSV files or databases, leading to data corruption or unauthorized access. All users of Apache Otava who use external data sources are affected.

Affected Systems
  • Apache Otava
Affected Versions: all versions
Remediation
  • Implement strict input validation for all data ingested into Otava, especially from CSV files or databases like PostgreSQL, BigQuery, and Graphite.
  • Review and update Otava's configuration to ensure it only processes trusted data sources.
  • Monitor for any unusual activity in performance test results that could indicate a compromise.
Stack Impact

This affects services using Apache Otava directly. No direct impact on nginx, docker, linux kernel, openssh, curl, openssl, python, or homelab components unless they are involved in the data pipeline to Otava.

Source →