Lucene search

K
githubGitHub Advisory DatabaseGHSA-JXR6-7QG5-8WV6
HistoryMar 22, 2023 - 9:30 p.m.

OpenNMS Meridian and Horizon vulnerable to Cross-Site Request Forgery

2023-03-2221:30:17
CWE-352
GitHub Advisory Database
github.com
23
opennms
meridian
horizon
cross-site request forgery
upgrade
confidential information
integrity
private network

CVSS3

8.1

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0

Percentile

9.0%

A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization’s private networks and should not be directly accessible from the Internet.

Affected configurations

Vulners
Node
org.opennmsopennms-webappRange<31.0.6
VendorProductVersionCPE
org.opennmsopennms-webapp*cpe:2.3:a:org.opennms:opennms-webapp:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS

0

Percentile

9.0%

Related for GHSA-JXR6-7QG5-8WV6