ROLE_REST can be used to escalate to ROLE_ADMIN via /rest/users
CVE-2023-0872

8.2HIGH

Key Information:

Vendor
CVE Published:
14 August 2023

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2023-0872?

The Horizon REST API in OpenMNS versions 31.0.8 and earlier is exposed to a vulnerability that allows elevation of privilege through a flaw in the users endpoint. This issue necessitates an upgrade to versions 32.0.2 or newer to mitigate the risks. OpenNMS emphasizes that both Meridian and Horizon installations are meant for private networks and should not be accessible from public internet sources.

Affected Version(s)

Horizon Windows 31.0.8 < 32.0.2

Meridian Windows 2020.0.0 <= 2020.1.37

Meridian Windows 2021.0.0 <= 2021.1.29

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik Wynter
.