Vulnerability Description
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opennms | Horizon | >= 32.0.0, < 32.0.2 |
| Opennms | Meridian | >= 2020.0.0, < 2020.1.38 |
Related Weaknesses (CWE)
References
- https://docs.opennms.com/horizon/32/releasenotes/changelog.htmlRelease Notes
- https://github.com/OpenNMS/opennms/pull/6355Patch
- https://docs.opennms.com/horizon/32/releasenotes/changelog.htmlRelease Notes
- https://github.com/OpenNMS/opennms/pull/6355Patch
FAQ
What is CVE-2023-0871?
CVE-2023-0871 is a vulnerability with a CVSS score of 5.4 (MEDIUM). XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instan...
How severe is CVE-2023-0871?
CVE-2023-0871 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0871?
Check the references section above for vendor advisories and patch information. Affected products include: Opennms Horizon, Opennms Meridian.