GHSA-chgr-j2p9-jjh8

Suggest an improvement
Source
https://github.com/advisories/GHSA-chgr-j2p9-jjh8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-chgr-j2p9-jjh8/GHSA-chgr-j2p9-jjh8.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-chgr-j2p9-jjh8
Aliases
Published
2023-08-14T18:32:59Z
Modified
2023-11-01T05:02:48.520503Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
OpenNMS vulnerable to Cross-site Scripting
Details

Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.

Database specific
{
    "nvd_published_at": "2023-08-14T18:15:11Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-14T21:12:22Z"
}
References

Affected packages

Maven / org.opennms:opennms-webapp

Package

Name
org.opennms:opennms-webapp
View open source insights on deps.dev
Purl
pkg:maven/org.opennms/opennms-webapp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
31.0.8
Fixed
32.0.2