First published: Mon May 11 2020(Updated: )
An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user regardless of its assigned permissions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.opennms.core:org.opennms.core.daemon | <26.0.1 | 26.0.1 |
Opennms Opennms Horizon | <26.1.0 | |
Opennms Opennms Meridian | <2018.1.19 | |
Opennms Opennms Meridian | >=2019<2019.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12760 is high with a CVSS score of 8.8.
CVE-2020-12760 is a vulnerability in OpenNMS Horizon before 26.0.1 and Meridian before 2018.1.19 and 2019 before 2019.1.7 that allows for arbitrary deserialization of Java objects, leading to remote code execution.
The vulnerability in CVE-2020-12760 can be exploited through the ActiveMQ channel configuration, allowing for arbitrary deserialization of Java objects.
The remedy for CVE-2020-12760 is to upgrade to OpenNMS Horizon 26.0.1 or later, or Meridian 2018.1.19 or later.
More information about CVE-2020-12760 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-12760), [OpenNMS Releases](https://github.com/OpenNMS/opennms/releases/tag/opennms-26.0.1-1), [OpenNMS Issue Tracker](https://issues.opennms.org/browse/NMS-12673).