CVE-2021-25931: Cross-Site Request Forgery in OpenNMS Horizon
(updated )
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at /opennms/admin/userGroupView/users/updateUser
. This flaw allows assigning ROLE_ADMIN
security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
References
- github.com/OpenNMS/opennms
- github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84
- github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
- github.com/advisories/GHSA-2rq5-68hm-h4j8
- nvd.nist.gov/vuln/detail/CVE-2021-25931
- www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931
Code Behaviors & Features
Detect and mitigate CVE-2021-25931 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →