An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user regardless of its assigned permissions.
References
Link | Resource |
---|---|
https://www.opennms.com/en/blog/2020-04-29-opennms-meridian-2018-1-18-wildfire-released/ | Release Notes Vendor Advisory |
https://www.opennms.com/en/blog/2020-04-29-opennms-meridian-2019-1-6-europa-released/ | Release Notes Vendor Advisory |
https://github.com/OpenNMS/opennms/releases/tag/opennms-26.0.1-1 | Release Notes |
https://issues.opennms.org/browse/NMS-12673 | Vendor Advisory |
https://www.opennms.com/en/blog/2020-04-29-opennms-horizon-26-0-1-luchador-released/ | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-05-11 09:15
Updated : 2020-05-13 10:42
NVD link : CVE-2020-12760
Mitre link : CVE-2020-12760
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
opennms
- opennms_meridian
- opennms_horizon