Vulnerability Details : CVE-2023-40612
In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file editor which is accessible to any user with ROLE_FILESYSTEM_EDITOR privileges is vulnerable to XXE injection attacks. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
Vulnerability category: XML external entity (XXE) injection
Products affected by CVE-2023-40612
- cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*
- cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-40612
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40612
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.0
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L |
0.5
|
4.7
|
The OpenNMS Group |
CWE ids for CVE-2023-40612
-
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.Assigned by:
- nvd@nist.gov (Primary)
- security@opennms.com (Secondary)
References for CVE-2023-40612
-
https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5
ChangelogRelease Notes
-
https://github.com/OpenNMS/opennms/pull/6288
NMS-15704: Securing Xml parser factory by christianpape · Pull Request #6288 · OpenNMS/opennms · GitHubPatch
Jump to