First published: Mon Aug 14 2023(Updated: )
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
Credit: security@opennms.com security@opennms.com security@opennms.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenNMS Horizon | >=31.0.8<32.0.2 | |
OpenNMS Meridian | <2020.1.38 | |
OpenNMS Meridian | >=2022.1.0<2022.1.19 | |
OpenNMS Meridian | >=2023.1.0<2023.1.6 | |
maven/org.opennms:opennms-webapp | >=31.0.8<32.0.2 | 32.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40312 is a vulnerability that allows for multiple reflected XSS attacks in OpenNMS Horizon 31.0.8 and earlier versions.
CVE-2023-40312 has a severity rating of 6.7, which is categorized as medium severity.
The affected software for CVE-2023-40312 includes OpenNMS Horizon 31.0.8 and earlier versions, as well as OpenNMS Meridian up to version 2020.1.38.
To fix CVE-2023-40312, it is recommended to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, or a later version.
The CWE category for CVE-2023-40312 is CWE-79, which is Cross-Site Scripting (XSS).