ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users
CVE-2023-0872
Key Information:
- Vendor
The Opennms Group
- Vendor
- CVE Published:
- 14 August 2023
Badges
What is CVE-2023-0872?
The Horizon REST API in OpenMNS versions 31.0.8 and earlier is exposed to a vulnerability that allows elevation of privilege through a flaw in the users endpoint. This issue necessitates an upgrade to versions 32.0.2 or newer to mitigate the risks. OpenNMS emphasizes that both Meridian and Horizon installations are meant for private networks and should not be accessible from public internet sources.
Affected Version(s)
Horizon Windows 31.0.8 < 32.0.2
Meridian Windows 2020.0.0 <= 2020.1.37
Meridian Windows 2021.0.0 <= 2021.1.29
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved