Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-40312", "assignerOrgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0", "state": "PUBLISHED", "assignerShortName": "OpenNMS", "dateReserved": "2023-08-14T13:02:51.889Z", "datePublished": "2023-08-14T17:35:26.710Z", "dateUpdated": "2024-09-27T21:57:09.816Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "platforms": ["Windows", "MacOS", "Linux"], "product": "Horizon", "repo": "https://github.com/OpenNMS/opennms", "vendor": "The OpenNMS Group", "versions": [{"lessThan": "32.0.2", "status": "affected", "version": "31.0.8", "versionType": "maven"}, {"lessThan": "31.0.8", "status": "unknown", "version": "0", "versionType": "maven"}]}, {"defaultStatus": "unaffected", "platforms": ["Windows", "MacOS", "Linux"], "product": "Meridian", "repo": "https://github.com/OpenNMS/opennms", "vendor": "The OpenNMS Group", "versions": [{"lessThanOrEqual": "2020.1.37", "status": "affected", "version": "2020.0.0", "versionType": "maven"}, {"lessThanOrEqual": "2021.1.29", "status": "affected", "version": "2021.0.0", "versionType": "maven"}, {"lessThanOrEqual": "2022.1.18", "status": "affected", "version": "2022.0.0", "versionType": "maven"}, {"lessThanOrEqual": "2023.1.5", "status": "affected", "version": "2023.0.0", "versionType": "maven"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Jordi Miralles Comins"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. <span style=\"background-color: rgb(255, 255, 255);\">The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.</span><br>"}], "value": "Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.\u00a0The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks\u00a0Jordi Miralles Comins for reporting this issue.\n"}], "impacts": [{"capecId": "CAPEC-591", "descriptions": [{"lang": "en", "value": "CAPEC-591 Reflected XSS"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "70b007e9-5235-4ee5-90b5-a71a81beeda0", "shortName": "OpenNMS", "dateUpdated": "2023-08-14T17:35:26.710Z"}, "references": [{"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html"}, {"url": "https://github.com/OpenNMS/opennms/pull/6356"}], "source": {"discovery": "UNKNOWN"}, "title": "Reflected XSS in multiple JSP files in opennms/opennms", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T18:31:53.401Z"}, "title": "CVE Program Container", "references": [{"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html", "tags": ["x_transferred"]}, {"url": "https://github.com/OpenNMS/opennms/pull/6356", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-27T21:49:35.769106Z", "id": "CVE-2023-40312", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-27T21:57:09.816Z"}}]}}