First published: Mon Aug 14 2023(Updated: )
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Credit: security@opennms.com security@opennms.com security@opennms.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenNMS Horizon | >=31.0.8<32.0.2 | |
OpenNMS Meridian | <2020.1.38 | |
OpenNMS Meridian | >=2022.1.0<2022.1.19 | |
OpenNMS Meridian | >=2023.1.0<2023.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40311 is a vulnerability that allows an attacker to store and load malicious code on JSPs or Angular templates in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2.
CVE-2023-40311 has a severity rating of 6.7 (medium).
To fix CVE-2023-40311, you should upgrade to Meridian 2023.1.6 or a later version.
OpenNMS Horizon versions 31.0.8 to 32.0.2 are affected by CVE-2023-40311.
CVE-2023-40311 has a CWE (Common Weakness Enumeration) of 79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').