In OpenNMS Horizon, versions opennms-17.0.0-1 through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.7-1 are vulnerable to Stored Cross-Site Scripting, since the function `add()` performs improper validation checks on the input sent to the `foreign-source` parameter. Due to this flaw an attacker could bypass the existing regex validation and inject an arbitrary script which will be stored in the database.
References
Link | Resource |
---|---|
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25935 | Exploit Third Party Advisory |
https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c | Patch Third Party Advisory |
https://github.com/OpenNMS/opennms/commit/101e3aa06ec9a1f8f266335fc6f5685c062c6117 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-05-25 12:15
Updated : 2021-06-03 08:22
NVD link : CVE-2021-25935
Mitre link : CVE-2021-25935
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
opennms
- horizon
- meridian