Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJycTUtNjhobS1oNGo4
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at /opennms/admin/userGroupView/users/updateUser
. This flaw allows assigning ROLE_ADMIN
security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJycTUtNjhobS1oNGo4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: almost 2 years ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00376
EPSS Percentile: 0.72523
Identifiers: GHSA-2rq5-68hm-h4j8, CVE-2021-25931
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-25931
- https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84
- https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931
- https://github.com/advisories/GHSA-2rq5-68hm-h4j8
Blast Radius: 1.0
Affected Packages
maven:org.opennms:opennms
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 1.0.0, < 27.1.1
Fixed in: 27.1.1
All affected versions:
All unaffected versions: 31.0.3