Search criteria
69 vulnerabilities found for meridian by opennms
FKIE_CVE-2023-40314
Vulnerability from fkie_nvd - Published: 2023-11-16 22:15 - Updated: 2024-11-21 08:19
Severity ?
5.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer
Meridian
and Horizon installation instructions state that they are intended for
installation within an organization's private networks and should not be
directly accessible from the Internet.
OpenNMS thanks
Moshe Apelbaum
for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94B45FA1-ADAF-421C-A461-DEF18A5C2456",
"versionEndExcluding": "32.0.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8F6EBD-EE5B-4F43-BE5C-674A138FF6AE",
"versionEndExcluding": "2023.1.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\nCross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\n\n\n\n\n\n\n\n\nMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet. \n\nOpenNMS thanks \n\nMoshe Apelbaum\n\n for reporting this issue.\n\n\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) en bootstrap.jsp en m\u00faltiples versiones de OpenNMS Meridian y Horizon permiten que un atacante acceda a informaci\u00f3n confidencial de la sesi\u00f3n. La soluci\u00f3n es actualizar a Horizon 32.0.5 o posterior y Meridian 2023.1.9 o posterior. Las instrucciones de instalaci\u00f3n de Meridian y Horizon indican que est\u00e1n dise\u00f1adas para su instalaci\u00f3n dentro de las redes privadas de una organizaci\u00f3n y no se debe acceder a ellas directamente desde Internet. OpenNMS agradece a Moshe Apelbaum por informar este problema."
}
],
"id": "CVE-2023-40314",
"lastModified": "2024-11-21T08:19:13.463",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-16T22:15:27.947",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6791"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6791"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-40612
Vulnerability from fkie_nvd - Published: 2023-08-23 19:15 - Updated: 2024-11-21 08:19
Severity ?
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "31.0.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1924FB-1A45-49FE-9C2E-A834AE9F4C03",
"versionEndExcluding": "2023.1.5",
"versionStartIncluding": "2023.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"id": "CVE-2023-40612",
"lastModified": "2024-11-21T08:19:49.703",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 4.7,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-23T19:15:08.443",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6288"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6288"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-91"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-91"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-40315
Vulnerability from fkie_nvd - Published: 2023-08-17 20:15 - Updated: 2024-11-21 08:19
Severity ?
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "31.0.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1924FB-1A45-49FE-9C2E-A834AE9F4C03",
"versionEndExcluding": "2023.1.5",
"versionStartIncluding": "2023.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u00a0The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
},
{
"lang": "es",
"value": "En OpenNMS Horizon 31.0.8 y versiones anteriores a 32.0.2 y versiones Meridian relacionadas, cualquier usuario que tenga el ROLE_FILESYSTEM_EDITOR puede escalar f\u00e1cilmente sus privilegios a ROLE_ADMIN o cualquier otro rol. La soluci\u00f3n es actualizar a Meridian 2023.1.5 u Horizon 32.0.2 o posterior. Las instrucciones de instalaci\u00f3n de Meridian y Horizon indican que est\u00e1n pensadas para su instalaci\u00f3n dentro de las redes privadas de una organizaci\u00f3n y que no se debe acceder a ellas directamente desde Internet. OpenNMS da las gracias a Erik Wynter por informar de este problema.\n"
}
],
"id": "CVE-2023-40315",
"lastModified": "2024-11-21T08:19:13.620",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 4.7,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-17T20:15:11.287",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6250"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-40313
Vulnerability from fkie_nvd - Published: 2023-08-17 19:15 - Updated: 2024-11-21 08:19
Severity ?
7.1 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F43487-53A1-4CB8-8771-46E4F904D3AA",
"versionEndExcluding": "32.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D5D1D2-CF1D-4F19-AEAF-FFCFC79776FE",
"versionEndExcluding": "2020.1.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "996A419A-2DC1-4F83-B0D7-EE97031F8A59",
"versionEndExcluding": "2021.1.30",
"versionStartIncluding": "2021.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "036E7C54-677A-4656-89E0-CC0134F51642",
"versionEndExcluding": "2022.1.19",
"versionStartIncluding": "2022.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA718877-9AB1-43FF-B1E5-9A47992EC1EC",
"versionEndExcluding": "2023.1.6",
"versionStartIncluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet."
},
{
"lang": "es",
"value": "Un int\u00e9rprete de BeanShell en modo servidor remoto se ejecuta en versiones de OpenNMS Horizon anteriores a 32.0.2 y en versiones de Meridian relacionadas, lo que podr\u00eda permitir la ejecuci\u00f3n remota arbitraria de c\u00f3digo Java. La soluci\u00f3n es actualizar a Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 u Horizon 32.0.2 o posterior. Las instrucciones de instalaci\u00f3n de Meridian y Horizon indican que est\u00e1n pensadas para instalarse dentro de las redes privadas de una organizaci\u00f3n y que no debe accederse a ellas directamente desde Internet."
}
],
"id": "CVE-2023-40313",
"lastModified": "2024-11-21T08:19:13.273",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.5,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-17T19:15:13.220",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "security@opennms.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6368"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-40312
Vulnerability from fkie_nvd - Published: 2023-08-14 18:15 - Updated: 2024-11-21 08:19
Severity ?
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
5.2 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.2 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "31.0.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D5D1D2-CF1D-4F19-AEAF-FFCFC79776FE",
"versionEndExcluding": "2020.1.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "036E7C54-677A-4656-89E0-CC0134F51642",
"versionEndExcluding": "2022.1.19",
"versionStartIncluding": "2022.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA718877-9AB1-43FF-B1E5-9A47992EC1EC",
"versionEndExcluding": "2023.1.6",
"versionStartIncluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"id": "CVE-2023-40312",
"lastModified": "2024-11-21T08:19:13.070",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 5.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-14T18:15:11.420",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "security@opennms.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6356"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6356"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-40311
Vulnerability from fkie_nvd - Published: 2023-08-14 18:15 - Updated: 2024-11-21 08:19
Severity ?
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
4.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
References
| URL | Tags | ||
|---|---|---|---|
| security@opennms.com | https://github.com/OpenNMS/opennms | Product | |
| security@opennms.com | https://github.com/OpenNMS/opennms/pull/6365 | Patch, Vendor Advisory | |
| security@opennms.com | https://github.com/OpenNMS/opennms/pull/6366 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenNMS/opennms | Product | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenNMS/opennms/pull/6365 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/OpenNMS/opennms/pull/6366 | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "31.0.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D5D1D2-CF1D-4F19-AEAF-FFCFC79776FE",
"versionEndExcluding": "2020.1.38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "036E7C54-677A-4656-89E0-CC0134F51642",
"versionEndExcluding": "2022.1.19",
"versionStartIncluding": "2022.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA718877-9AB1-43FF-B1E5-9A47992EC1EC",
"versionEndExcluding": "2023.1.6",
"versionStartIncluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"id": "CVE-2023-40311",
"lastModified": "2024-11-21T08:19:12.913",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 5.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-14T18:15:11.247",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Product"
],
"url": "https://github.com/OpenNMS/opennms"
},
{
"source": "security@opennms.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"source": "security@opennms.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/OpenNMS/opennms"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/6366"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0872
Vulnerability from fkie_nvd - Published: 2023-08-14 18:15 - Updated: 2024-11-21 07:38
Severity ?
8.2 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
OpenNMS thanks Erik Wynter for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62C4B0BB-21CA-40FC-8A39-26B86AA35FD9",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "31.0.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8437D5CA-17AA-4711-8E3D-DFB237B617AD",
"versionEndIncluding": "2020.1.37",
"versionStartIncluding": "2020.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19DD5F20-8B2D-4559-AB47-DB4E3CC13DD0",
"versionEndIncluding": "2021.1.29",
"versionStartIncluding": "2021.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B33DB38B-B66B-4C3F-B4BE-BA2407E99DEC",
"versionEndIncluding": "2022.1.18",
"versionStartIncluding": "2022.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "518ACF5B-D2BB-4014-85C5-6F741041370C",
"versionEndIncluding": "2023.1.5",
"versionStartIncluding": "2023.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n\nOpenNMS thanks\u00a0Erik Wynter for reporting this issue."
}
],
"id": "CVE-2023-0872",
"lastModified": "2024-11-21T07:38:00.763",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 5.3,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-14T18:15:10.730",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6354"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6354"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0871
Vulnerability from fkie_nvd - Published: 2023-08-11 17:15 - Updated: 2024-11-21 07:38
Severity ?
5.4 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
6.1 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Summary
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E348236-BC02-4334-8F84-AC9F91C3D0AD",
"versionEndExcluding": "32.0.2",
"versionStartIncluding": "32.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:horizon:31.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB86992A-06FF-4B7D-BFD3-FC04DFC96FBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B9CB53-0A8C-4DB4-85E8-E0F81D6168AC",
"versionEndExcluding": "2020.1.38",
"versionStartIncluding": "2020.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAB4DC97-9047-4302-90A0-4711AE93D364",
"versionEndExcluding": "2021.1.30",
"versionStartIncluding": "2021.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "230DB641-455F-4F55-AFB2-1E6D974EE080",
"versionEndExcluding": "2022.1.9",
"versionStartIncluding": "2022.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9822AB30-2205-496D-952D-A0CFF409B72F",
"versionEndExcluding": "2023.1.6",
"versionStartIncluding": "2023.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms\u00a0is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u00a0OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.\n"
}
],
"id": "CVE-2023-0871",
"lastModified": "2024-11-21T07:38:00.630",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-11T17:15:08.980",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6355"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/6355"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0870
Vulnerability from fkie_nvd - Published: 2023-03-22 19:15 - Updated: 2024-11-21 07:38
Severity ?
8.1 (High) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Summary
A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B1236D1-83CD-4F35-84B3-3D4699276E9F",
"versionEndExcluding": "31.0.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F635108-0354-41C2-A2D8-F1297FC9311E",
"versionEndExcluding": "2020.1.33",
"versionStartIncluding": "2020.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB510EA1-539C-405F-809E-AC6C16FBD6B7",
"versionEndExcluding": "2021.1.25",
"versionStartIncluding": "2021.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A71A1FDB-72DF-4E73-B4DA-7B475E3730BF",
"versionEndExcluding": "2022.1.14",
"versionStartIncluding": "2022.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:2023.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD05EE7C-7E63-4AAD-A45F-E1503A1F863B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n"
}
],
"id": "CVE-2023-0870",
"lastModified": "2024-11-21T07:38:00.507",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 5.8,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-03-22T19:15:11.817",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0868
Vulnerability from fkie_nvd - Published: 2023-02-23 15:15 - Updated: 2024-11-21 07:38
Severity ?
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies. Users
should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and
Horizon installation instructions state that they are intended for installation
within an organization's private networks and should not be directly accessible
from the Internet.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC4EEF4-1204-4051-8E8E-7D3E69911D81",
"versionEndExcluding": "31.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCCB664-CCB6-4D87-A2C4-9C216BAC38DB",
"versionEndExcluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies.\u00a0Users\nshould upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and\nHorizon installation instructions state that they are intended for installation\nwithin an organization\u0027s private networks and should not be directly accessible\nfrom the Internet.\n\n\n\n\n\n\n\n\n\n\n"
}
],
"id": "CVE-2023-0868",
"lastModified": "2024-11-21T07:38:00.267",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 5.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-23T15:15:11.090",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13"
},
{
"source": "security@opennms.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/5740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/OpenNMS/opennms/pull/5740"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0867
Vulnerability from fkie_nvd - Published: 2023-02-23 15:15 - Updated: 2024-11-21 07:38
Severity ?
6.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information. Users
should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and
Horizon installation instructions state that they are intended for installation
within an organization's private networks and should not be directly accessible
from the Internet.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC4EEF4-1204-4051-8E8E-7D3E69911D81",
"versionEndExcluding": "31.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCCB664-CCB6-4D87-A2C4-9C216BAC38DB",
"versionEndExcluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information.\u00a0Users\nshould upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and\nHorizon installation instructions state that they are intended for installation\nwithin an organization\u0027s private networks and should not be directly accessible\nfrom the Internet.\n\n\n\n\n\n\n\n"
}
],
"id": "CVE-2023-0867",
"lastModified": "2024-11-21T07:38:00.143",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 5.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-23T15:15:11.000",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5765"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-0869
Vulnerability from fkie_nvd - Published: 2023-02-23 15:15 - Updated: 2024-11-21 07:38
Severity ?
5.8 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Cross-site scripting in outage/list.htm in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4 or newer.
Meridian
and Horizon installation instructions state that they are intended for
installation within an organization's private networks and should not be
directly accessible from the Internet.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC4EEF4-1204-4051-8E8E-7D3E69911D81",
"versionEndExcluding": "31.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCCB664-CCB6-4D87-A2C4-9C216BAC38DB",
"versionEndExcluding": "2023.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting in outage/list.htm in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4 or newer. \n\n\n\n\n\n\n\n\n\n\n\nMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet.\n\n"
}
],
"id": "CVE-2023-0869",
"lastModified": "2024-11-21T07:38:00.387",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 4.2,
"source": "security@opennms.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-23T15:15:11.190",
"references": [
{
"source": "security@opennms.com",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.0"
},
{
"source": "security@opennms.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5734"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/OpenNMS/opennms/pull/5734"
}
],
"sourceIdentifier": "security@opennms.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@opennms.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-40314 (GCVE-0-2023-40314)
Vulnerability from cvelistv5 – Published: 2023-11-16 21:14 – Updated: 2024-08-29 14:45
VLAI?
Title
Cross-site scripting in bootstrap.jsp
Summary
Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer
Meridian
and Horizon installation instructions state that they are intended for
installation within an organization's private networks and should not be
directly accessible from the Internet.
OpenNMS thanks
Moshe Apelbaum
for reporting this issue.
Severity ?
5.8 (Medium)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.4
(git)
|
|||||||
|
|||||||||
Credits
Moshe Apelbaum
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.567Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6791"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40314",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-29T14:44:57.380992Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-29T14:45:44.028Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"webapp"
],
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS",
"vendor": " The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.4",
"status": "affected",
"version": "31.0.8",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"webapp"
],
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group ",
"versions": [
{
"lessThan": "2023.1.8",
"status": "unknown",
"version": "0",
"versionType": "git"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Moshe Apelbaum"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\nCross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\u003cbr\u003e\n\n\n\n\n\n\n\n\n\n\u003cp\u003eMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet. \n\nOpenNMS thanks \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMoshe Apelbaum\u003c/span\u003e\n\n for reporting this issue.\n\n\u003c/p\u003e\n\n\n\n"
}
],
"value": "\n\n\nCross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\n\n\n\n\n\n\n\n\nMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet. \n\nOpenNMS thanks \n\nMoshe Apelbaum\n\n for reporting this issue.\n\n\n\n\n\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-16T21:14:07.488Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6791"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nupgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\u003cbr\u003e"
}
],
"value": "\nupgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Cross-site scripting in bootstrap.jsp",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40314",
"datePublished": "2023-11-16T21:14:07.488Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-08-29T14:45:44.028Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40612 (GCVE-0-2023-40612)
Vulnerability from cvelistv5 – Published: 2023-08-23 18:22 – Updated: 2024-10-01 15:52
VLAI?
Title
Authenticated XXE Injection Via The File Editor
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
5.3 (Medium)
CWE
- CWE-91 - XML Injection (aka Blind XPath Injection)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:38:50.926Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6288"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40612",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T15:11:10.621070Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-01T15:52:57.777Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2023.0.0",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-201",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-201 XML Entity Linking"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-91",
"description": "CWE-91 XML Injection (aka Blind XPath Injection)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T18:35:01.032Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6288"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated XXE Injection Via The File Editor",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40612",
"datePublished": "2023-08-23T18:22:49.025Z",
"dateReserved": "2023-08-17T16:08:56.617Z",
"dateUpdated": "2024-10-01T15:52:57.777Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40315 (GCVE-0-2023-40315)
Vulnerability from cvelistv5 – Published: 2023-08-17 19:04 – Updated: 2024-10-28 19:17
VLAI?
Title
ROLE_FILESYSTEM_EDITOR Can Be Used To Escalate To ROLE_ADMIN
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
5.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.407Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6250"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40315",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T17:47:10.985903Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:17:45.325Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2023.0.0",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u0026nbsp;The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u00a0The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-17T19:04:01.437Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6250"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "ROLE_FILESYSTEM_EDITOR Can Be Used To Escalate To ROLE_ADMIN",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40315",
"datePublished": "2023-08-17T19:04:01.437Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-10-28T19:17:45.325Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40313 (GCVE-0-2023-40313)
Vulnerability from cvelistv5 – Published: 2023-08-17 18:24 – Updated: 2024-10-08 13:04
VLAI?
Title
Disable BeanShell Interpreter Remote Server Mode
Summary
A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Severity ?
7.1 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
29.0.4 , < 32.0.2
(maven)
Unknown: 0 , < 29.0.4 (maven) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6368"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "horizon",
"vendor": "opennms",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "29.0.4",
"versionType": "maven"
},
{
"lessThan": "29.0.4",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"cpes": [
"cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "meridian",
"vendor": "opennms",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40313",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:59:42.694660Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:04:43.357Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "29.0.4",
"versionType": "maven"
},
{
"lessThan": "29.0.4",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet."
}
],
"value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-17T18:24:08.866Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6368"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Disable BeanShell Interpreter Remote Server Mode",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40313",
"datePublished": "2023-08-17T18:24:08.866Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-10-08T13:04:43.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40312 (GCVE-0-2023-40312)
Vulnerability from cvelistv5 – Published: 2023-08-14 17:35 – Updated: 2024-09-27 21:57
VLAI?
Title
Reflected XSS in multiple JSP files in opennms/opennms
Summary
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Severity ?
6.7 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Jordi Miralles Comins
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6356"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40312",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T21:49:35.769106Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T21:57:09.816Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jordi Miralles Comins"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u0026nbsp;Jordi Miralles Comins for reporting this issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-591",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-591 Reflected XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:35:26.710Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6356"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Reflected XSS in multiple JSP files in opennms/opennms",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40312",
"datePublished": "2023-08-14T17:35:26.710Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-09-27T21:57:09.816Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40311 (GCVE-0-2023-40311)
Vulnerability from cvelistv5 – Published: 2023-08-14 17:31 – Updated: 2024-09-27 21:57
VLAI?
Title
Stored XSS in multiple JSP files in opennms/opennms
Summary
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Severity ?
6.7 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Jordi Miralles Comins
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:52.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6366"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40311",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T21:49:38.301995Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T21:57:16.869Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jordi Miralles Comins"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMultiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u0026nbsp;Jordi Miralles Comins for reporting this issue.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:31:29.877Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6366"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stored XSS in multiple JSP files in opennms/opennms",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40311",
"datePublished": "2023-08-14T17:31:29.877Z",
"dateReserved": "2023-08-14T13:02:51.888Z",
"dateUpdated": "2024-09-27T21:57:16.869Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0872 (GCVE-0-2023-0872)
Vulnerability from cvelistv5 – Published: 2023-08-14 17:21 – Updated: 2024-10-03 20:25
VLAI?
Title
ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users
Summary
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
8.2 (High)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.729Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6354"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0872",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T20:25:17.539547Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T20:25:29.936Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.\u0026nbsp;\u003c/span\u003e\u003c/span\u003eThe solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003eOpenNMS thanks\u0026nbsp;Erik Wynter for reporting this issue."
}
],
"value": "The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n\nOpenNMS thanks\u00a0Erik Wynter for reporting this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:21:58.203Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6354"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0872",
"datePublished": "2023-08-14T17:21:58.203Z",
"dateReserved": "2023-02-16T18:29:36.820Z",
"dateUpdated": "2024-10-03T20:25:29.936Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0871 (GCVE-0-2023-0871)
Vulnerability from cvelistv5 – Published: 2023-08-11 16:13 – Updated: 2024-10-01 19:13
VLAI?
Title
An XML External Entity injection vulnerability
Summary
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
Severity ?
5.4 (Medium)
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Moshe Apelbaum
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6355"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0871",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T19:06:46.173797Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-01T19:13:29.380Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.6",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2022.1.19",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThan": "2021.1.30",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThan": "2020.1.38",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Moshe Apelbaum"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cstrong\u003eXXE injection\u003c/strong\u003e in \u003cstrong\u003e/rtc/post/ endpoint\u003c/strong\u003e in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms\u0026nbsp;is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.\u0026nbsp;The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms\u00a0is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u00a0OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-201",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-201 XML Entity Linking"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:29:33.329Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6355"
},
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer.\u003cbr\u003e"
}
],
"value": "Upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer.\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "An XML External Entity injection vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0871",
"datePublished": "2023-08-11T16:13:50.714Z",
"dateReserved": "2023-02-16T18:29:35.727Z",
"dateUpdated": "2024-10-01T19:13:29.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0870 (GCVE-0-2023-0870)
Vulnerability from cvelistv5 – Published: 2023-03-22 18:16 – Updated: 2025-02-25 18:40
VLAI?
Title
Form Can Be Manipulated with Cross-Site Request Forgery (CSRF)
Summary
A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Severity ?
8.1 (High)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Meridian |
Affected:
2020.1.0 , < 2020.1.33
(git)
Affected: 2021.1.0 , < 2021.1.25 (git) Affected: 2022.1.0 , < 2022.1.14 (git) Affected: 2023.1.0 , < 2023.1.1 (git) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.582Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0870",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T18:39:58.031528Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T18:40:53.228Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"form"
],
"platforms": [
"Linux",
"Windows",
"MacOS"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group ",
"versions": [
{
"lessThan": "2020.1.33",
"status": "affected",
"version": "2020.1.0",
"versionType": "git"
},
{
"lessThan": "2021.1.25",
"status": "affected",
"version": "2021.1.0 ",
"versionType": "git"
},
{
"lessThan": "2022.1.14",
"status": "affected",
"version": "2022.1.0",
"versionType": "git"
},
{
"lessThan": "2023.1.1",
"status": "affected",
"version": "2023.1.0",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"modules": [
"form"
],
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group",
"versions": [
{
"status": "unaffected",
"version": "31.0.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-22T18:16:42.537Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. \u003cbr\u003e"
}
],
"value": "Upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. \n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Form Can Be Manipulated with Cross-Site Request Forgery (CSRF)",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003cbr\u003e"
}
],
"value": "Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0870",
"datePublished": "2023-03-22T18:16:42.537Z",
"dateReserved": "2023-02-16T18:29:34.628Z",
"dateUpdated": "2025-02-25T18:40:53.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40314 (GCVE-0-2023-40314)
Vulnerability from nvd – Published: 2023-11-16 21:14 – Updated: 2024-08-29 14:45
VLAI?
Title
Cross-site scripting in bootstrap.jsp
Summary
Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer
Meridian
and Horizon installation instructions state that they are intended for
installation within an organization's private networks and should not be
directly accessible from the Internet.
OpenNMS thanks
Moshe Apelbaum
for reporting this issue.
Severity ?
5.8 (Medium)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.4
(git)
|
|||||||
|
|||||||||
Credits
Moshe Apelbaum
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.567Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6791"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40314",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-29T14:44:57.380992Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-29T14:45:44.028Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"webapp"
],
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS",
"vendor": " The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.4",
"status": "affected",
"version": "31.0.8",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"webapp"
],
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group ",
"versions": [
{
"lessThan": "2023.1.8",
"status": "unknown",
"version": "0",
"versionType": "git"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Moshe Apelbaum"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\nCross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\u003cbr\u003e\n\n\n\n\n\n\n\n\n\n\u003cp\u003eMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet. \n\nOpenNMS thanks \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMoshe Apelbaum\u003c/span\u003e\n\n for reporting this issue.\n\n\u003c/p\u003e\n\n\n\n"
}
],
"value": "\n\n\nCross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\n\n\n\n\n\n\n\n\nMeridian\nand Horizon installation instructions state that they are intended for\ninstallation within an organization\u0027s private networks and should not be\ndirectly accessible from the Internet. \n\nOpenNMS thanks \n\nMoshe Apelbaum\n\n for reporting this issue.\n\n\n\n\n\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-16T21:14:07.488Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6791"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nupgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\u003cbr\u003e"
}
],
"value": "\nupgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer\n\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Cross-site scripting in bootstrap.jsp",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40314",
"datePublished": "2023-11-16T21:14:07.488Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-08-29T14:45:44.028Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40612 (GCVE-0-2023-40612)
Vulnerability from nvd – Published: 2023-08-23 18:22 – Updated: 2024-10-01 15:52
VLAI?
Title
Authenticated XXE Injection Via The File Editor
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
5.3 (Medium)
CWE
- CWE-91 - XML Injection (aka Blind XPath Injection)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:38:50.926Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6288"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40612",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T15:11:10.621070Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-01T15:52:57.777Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2023.0.0",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-201",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-201 XML Entity Linking"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-91",
"description": "CWE-91 XML Injection (aka Blind XPath Injection)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-23T18:35:01.032Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6288"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated XXE Injection Via The File Editor",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40612",
"datePublished": "2023-08-23T18:22:49.025Z",
"dateReserved": "2023-08-17T16:08:56.617Z",
"dateUpdated": "2024-10-01T15:52:57.777Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40315 (GCVE-0-2023-40315)
Vulnerability from nvd – Published: 2023-08-17 19:04 – Updated: 2024-10-28 19:17
VLAI?
Title
ROLE_FILESYSTEM_EDITOR Can Be Used To Escalate To ROLE_ADMIN
Summary
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
5.3 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.407Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6250"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40315",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T17:47:10.985903Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:17:45.325Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2023.0.0",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u0026nbsp;The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u00a0The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-17T19:04:01.437Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6250"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "ROLE_FILESYSTEM_EDITOR Can Be Used To Escalate To ROLE_ADMIN",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40315",
"datePublished": "2023-08-17T19:04:01.437Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-10-28T19:17:45.325Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40313 (GCVE-0-2023-40313)
Vulnerability from nvd – Published: 2023-08-17 18:24 – Updated: 2024-10-08 13:04
VLAI?
Title
Disable BeanShell Interpreter Remote Server Mode
Summary
A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Severity ?
7.1 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
29.0.4 , < 32.0.2
(maven)
Unknown: 0 , < 29.0.4 (maven) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6368"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "horizon",
"vendor": "opennms",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "29.0.4",
"versionType": "maven"
},
{
"lessThan": "29.0.4",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"cpes": [
"cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "meridian",
"vendor": "opennms",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40313",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T12:59:42.694660Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T13:04:43.357Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "29.0.4",
"versionType": "maven"
},
{
"lessThan": "29.0.4",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet."
}
],
"value": "A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-17T18:24:08.866Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6368"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Disable BeanShell Interpreter Remote Server Mode",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40313",
"datePublished": "2023-08-17T18:24:08.866Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-10-08T13:04:43.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40312 (GCVE-0-2023-40312)
Vulnerability from nvd – Published: 2023-08-14 17:35 – Updated: 2024-09-27 21:57
VLAI?
Title
Reflected XSS in multiple JSP files in opennms/opennms
Summary
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Severity ?
6.7 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Jordi Miralles Comins
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:53.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6356"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40312",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T21:49:35.769106Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T21:57:09.816Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jordi Miralles Comins"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u0026nbsp;Jordi Miralles Comins for reporting this issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-591",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-591 Reflected XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:35:26.710Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6356"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Reflected XSS in multiple JSP files in opennms/opennms",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40312",
"datePublished": "2023-08-14T17:35:26.710Z",
"dateReserved": "2023-08-14T13:02:51.889Z",
"dateUpdated": "2024-09-27T21:57:09.816Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-40311 (GCVE-0-2023-40311)
Vulnerability from nvd – Published: 2023-08-14 17:31 – Updated: 2024-09-27 21:57
VLAI?
Title
Stored XSS in multiple JSP files in opennms/opennms
Summary
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Severity ?
6.7 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Jordi Miralles Comins
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:31:52.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6366"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40311",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-27T21:49:38.301995Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-27T21:57:16.869Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jordi Miralles Comins"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMultiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u0026nbsp;Jordi Miralles Comins for reporting this issue.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:31:29.877Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6365"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6366"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stored XSS in multiple JSP files in opennms/opennms",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-40311",
"datePublished": "2023-08-14T17:31:29.877Z",
"dateReserved": "2023-08-14T13:02:51.888Z",
"dateUpdated": "2024-09-27T21:57:16.869Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0872 (GCVE-0-2023-0872)
Vulnerability from nvd – Published: 2023-08-14 17:21 – Updated: 2024-10-03 20:25
VLAI?
Title
ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users
Summary
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
OpenNMS thanks Erik Wynter for reporting this issue.
Severity ?
8.2 (High)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.729Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6354"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0872",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T20:25:17.539547Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T20:25:29.936Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThanOrEqual": "2020.1.37",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2021.1.29",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2022.1.18",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "2023.1.5",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(235, 236, 240);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.\u0026nbsp;\u003c/span\u003e\u003c/span\u003eThe solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003cbr\u003e\u003cbr\u003e\u003c/span\u003eOpenNMS thanks\u0026nbsp;Erik Wynter for reporting this issue."
}
],
"value": "The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n\nOpenNMS thanks\u00a0Erik Wynter for reporting this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T17:21:58.203Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6354"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0872",
"datePublished": "2023-08-14T17:21:58.203Z",
"dateReserved": "2023-02-16T18:29:36.820Z",
"dateUpdated": "2024-10-03T20:25:29.936Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0871 (GCVE-0-2023-0871)
Vulnerability from nvd – Published: 2023-08-11 16:13 – Updated: 2024-10-01 19:13
VLAI?
Title
An XML External Entity injection vulnerability
Summary
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
Severity ?
5.4 (Medium)
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Horizon |
Affected:
31.0.8 , < 32.0.2
(maven)
Unknown: 0 , < 31.0.8 (maven) |
|||||||
|
|||||||||
Credits
Moshe Apelbaum
Erik Wynter
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.671Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/6355"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0871",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T19:06:46.173797Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-01T19:13:29.380Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "32.0.2",
"status": "affected",
"version": "31.0.8",
"versionType": "maven"
},
{
"lessThan": "31.0.8",
"status": "unknown",
"version": "0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS/opennms",
"vendor": "The OpenNMS Group",
"versions": [
{
"lessThan": "2023.1.6",
"status": "affected",
"version": "2023.0.0",
"versionType": "maven"
},
{
"lessThan": "2022.1.19",
"status": "affected",
"version": "2022.0.0",
"versionType": "maven"
},
{
"lessThan": "2021.1.30",
"status": "affected",
"version": "2021.0.0",
"versionType": "maven"
},
{
"lessThan": "2020.1.38",
"status": "affected",
"version": "2020.0.0",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Moshe Apelbaum"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik Wynter"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cstrong\u003eXXE injection\u003c/strong\u003e in \u003cstrong\u003e/rtc/post/ endpoint\u003c/strong\u003e in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms\u0026nbsp;is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.\u0026nbsp;The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms\u00a0is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u00a0OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-201",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-201 XML Entity Linking"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:29:33.329Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/6355"
},
{
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer.\u003cbr\u003e"
}
],
"value": "Upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer.\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "An XML External Entity injection vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0871",
"datePublished": "2023-08-11T16:13:50.714Z",
"dateReserved": "2023-02-16T18:29:35.727Z",
"dateUpdated": "2024-10-01T19:13:29.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-0870 (GCVE-0-2023-0870)
Vulnerability from nvd – Published: 2023-03-22 18:16 – Updated: 2025-02-25 18:40
VLAI?
Title
Form Can Be Manipulated with Cross-Site Request Forgery (CSRF)
Summary
A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Severity ?
8.1 (High)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| The OpenNMS Group | Meridian |
Affected:
2020.1.0 , < 2020.1.33
(git)
Affected: 2021.1.0 , < 2021.1.25 (git) Affected: 2022.1.0 , < 2022.1.14 (git) Affected: 2023.1.0 , < 2023.1.1 (git) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:24:34.582Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
},
{
"tags": [
"x_transferred"
],
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-0870",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T18:39:58.031528Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T18:40:53.228Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"form"
],
"platforms": [
"Linux",
"Windows",
"MacOS"
],
"product": "Meridian",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group ",
"versions": [
{
"lessThan": "2020.1.33",
"status": "affected",
"version": "2020.1.0",
"versionType": "git"
},
{
"lessThan": "2021.1.25",
"status": "affected",
"version": "2021.1.0 ",
"versionType": "git"
},
{
"lessThan": "2022.1.14",
"status": "affected",
"version": "2022.1.0",
"versionType": "git"
},
{
"lessThan": "2023.1.1",
"status": "affected",
"version": "2023.1.0",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"modules": [
"form"
],
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "Horizon",
"repo": "https://github.com/OpenNMS",
"vendor": "The OpenNMS Group",
"versions": [
{
"status": "unaffected",
"version": "31.0.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-22T18:16:42.537Z",
"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"shortName": "OpenNMS"
},
"references": [
{
"url": "https://github.com/OpenNMS/opennms/pull/5835/files"
},
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. \u003cbr\u003e"
}
],
"value": "Upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. \n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Form Can Be Manipulated with Cross-Site Request Forgery (CSRF)",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\u003cbr\u003e"
}
],
"value": "Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0",
"assignerShortName": "OpenNMS",
"cveId": "CVE-2023-0870",
"datePublished": "2023-03-22T18:16:42.537Z",
"dateReserved": "2023-02-16T18:29:34.628Z",
"dateUpdated": "2025-02-25T18:40:53.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}