First published: Wed Sep 14 2016(Updated: )
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This issue was fixed in version 18.0.2, released on September 20, 2016.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Opennms Opennms | <18.0.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2016-6556.
The severity level of CVE-2016-6556 is high (6.1).
The vulnerability is caused by insufficient filtering of SNMP agent supplied data in OpenNMS version 18.0.1 and prior.
An attacker can exploit this vulnerability by creating a malicious SNMP 'sysName' or 'sysContact' response that contains an XSS payload.
Yes, you can find references for this vulnerability at the following links: [link1], [link2].