CVE-2023-40312

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40312
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-40312.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-40312
Aliases
Published
2023-08-14T18:15:11Z
Modified
2024-10-12T11:05:41.747310Z
Severity
  • 5.2 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.

References

Affected packages

Git / github.com/opennms/opennms

Affected ranges

Type
GIT
Repo
https://github.com/opennms/opennms
Events

Affected versions

meridian-foundation-2020.*

meridian-foundation-2020.1.36-1
meridian-foundation-2020.1.37-1
meridian-foundation-2020.1.38-1

meridian-foundation-2021.*

meridian-foundation-2021.1.28-1
meridian-foundation-2021.1.29-1
meridian-foundation-2021.1.30-1

meridian-foundation-2022.*

meridian-foundation-2022.1.17-1
meridian-foundation-2022.1.18-1
meridian-foundation-2022.1.19-1

meridian-foundation-2023.*

meridian-foundation-2023.1.4-1
meridian-foundation-2023.1.5-1
meridian-foundation-2023.1.6-1

opennms-31.*

opennms-31.0.8-1
opennms-31.0.9-1

opennms-32.*

opennms-32.0.0-1
opennms-32.0.1-1