Mend Vulnerability Database
What is a CVE vulnerability ID? What is a WS vulnerability ID?New vulnerability? Tell us about it!
We found results for “”
Date: May 20, 2021
OverviewIn OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1--meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
DetailsThe module `opennms` can be abused by Stored Cross-Site Scripting vulnerability since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.
PoC DetailsLogin to the application and navigate to the “opennms/admin/notification/noticeWizard/choosePath.jsp” endpoint.
Insert the payload into the “Name" field and click on “Finish". Also add some text in the “Test Message" field since it is a mandatory field.
Now a pop-up will be presented, indicaticating the successful execution of the script.
<script>alert(“XSS in Choose Path")</script>
Affected Environmentsopennms-1-0-stable, opennms-1.0.1 through opennms-27.1.0-1 meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1 meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1
PreventionUpgrade to Horizon 188.8.131.52, Meridian 2020.1.7 or Meridian 2019.1.19
Good to know:
Upgrade to version org.opennms:opennms:27.1.1, org.opennms:opennms-webapp:27.1.1
|Attack Vector (AV):||Network|
|Attack Complexity (AC):||Low|
|Privileges Required (PR):||High|
|User Interaction (UI):||Required|
|Access Vector (AV):||Network|
|Access Complexity (AC):||Medium|