opennms horizon 在web页面生成时对输入的转义处理不恰当(跨站脚本)
CVE编号
CVE-2021-25935利用情况
暂无补丁情况
N/A披露时间
2021-05-26漏洞描述
In OpenNMS Horizon, versions opennms-17.0.0-1 through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.7-1 are vulnerable to Stored Cross-Site Scripting, since the function `add()` performs improper validation checks on the input sent to the `foreign-source` parameter. Due to this flaw an attacker could bypass the existing regex validation and inject an arbitrary script which will be stored in the database.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | opennms | horizon | * | From (including) 17.0.0 | Up to (including) 27.1.0 | ||||
运行在以下环境 | |||||||||
应用 | opennms | meridian | * | From (including) 2015.1.0 | Up to (including) 2019.1.18 | ||||
运行在以下环境 | |||||||||
应用 | opennms | meridian | * | From (including) 2020.1.0 | Up to (including) 2020.1.7 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-79 | 在Web页面生成时对输入的转义处理不恰当(跨站脚本) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论