GHSA-2rq5-68hm-h4j8

Suggest an improvement
Source
https://github.com/advisories/GHSA-2rq5-68hm-h4j8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-2rq5-68hm-h4j8/GHSA-2rq5-68hm-h4j8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2rq5-68hm-h4j8
Aliases
Published
2021-05-25T18:46:55Z
Modified
2023-11-08T04:05:17.716089Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Cross-Site Request Forgery in OpenNMS Horizon
Details

In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at /opennms/admin/userGroupView/users/updateUser. This flaw allows assigning ROLE_ADMIN security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.

Database specific
{
    "nvd_published_at": "2021-05-20T15:15:00Z",
    "github_reviewed_at": "2021-05-21T17:28:35Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-352"
    ]
}
References

Affected packages

Maven / org.opennms:opennms

Package

Name
org.opennms:opennms
View open source insights on deps.dev
Purl
pkg:maven/org.opennms/opennms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0
Fixed
27.1.1