Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.opennms/opennms
  4. ›
  5. CVE-2021-3396

CVE-2021-3396: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

May 24, 2022 (updated August 3, 2023)

OpenNMS Meridian 2016, 2017, 2018 before 2018.1.25, 2019 before 2019.1.16, and 2020 before 2020.1.5, Horizon 1.2 through 27.0.4, and Newts <1.5.3 has Incorrect Access Control, which allows local and remote code execution using JEXL expressions.

References

  • github.com/OpenNMS/opennms/pull/3281
  • github.com/advisories/GHSA-c3mp-9vx3-2rvv
  • issues.opennms.org/browse/NMS-13103
  • nvd.nist.gov/vuln/detail/CVE-2021-3396
  • www.opennms.com/en/blog/2021-02-16-cve-2021-3396-full-security-disclosure/

Code Behaviors & Features

Detect and mitigate CVE-2021-3396 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 16.0.0 up to 27.0.3

Fixed versions

  • 27.0.4

Solution

Upgrade to version 27.0.4 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.opennms/opennms/CVE-2021-3396.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:30 +0000.