{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-40313","assignerOrgId":"70b007e9-5235-4ee5-90b5-a71a81beeda0","state":"PUBLISHED","assignerShortName":"OpenNMS","dateReserved":"2023-08-14T13:02:51.889Z","datePublished":"2023-08-17T18:24:08.866Z","dateUpdated":"2024-10-08T13:04:43.357Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows","MacOS","Linux"],"product":"Horizon","repo":"https://github.com/OpenNMS/opennms","vendor":"The OpenNMS Group","versions":[{"lessThan":"32.0.2","status":"affected","version":"29.0.4","versionType":"maven"},{"lessThan":"29.0.4","status":"unknown","version":"0","versionType":"maven"}]},{"defaultStatus":"unaffected","platforms":["Windows","MacOS","Linux"],"product":"Meridian","repo":"https://github.com/OpenNMS/opennms","vendor":"The OpenNMS Group","versions":[{"lessThanOrEqual":"2020.1.37","status":"affected","version":"2020.0.0","versionType":"maven"},{"lessThanOrEqual":"2021.1.29","status":"affected","version":"2021.0.0","versionType":"maven"},{"lessThanOrEqual":"2022.1.18","status":"affected","version":"2022.0.0","versionType":"maven"},{"lessThanOrEqual":"2023.1.5","status":"affected","version":"2023.0.0","versionType":"maven"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet."}],"value":"A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL. Score based on the assumption that Horizon and Meridian are installed on internally protected networks and not exposed to the Internet, per installation instructions."}]}],"providerMetadata":{"orgId":"70b007e9-5235-4ee5-90b5-a71a81beeda0","shortName":"OpenNMS","dateUpdated":"2023-08-17T18:24:08.866Z"},"references":[{"url":"https://docs.opennms.com/horizon/32/releasenotes/changelog.html"},{"url":"https://github.com/OpenNMS/opennms/pull/6368"}],"source":{"discovery":"UNKNOWN"},"title":"Disable BeanShell Interpreter Remote Server Mode","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T18:31:53.771Z"},"title":"CVE Program Container","references":[{"url":"https://docs.opennms.com/horizon/32/releasenotes/changelog.html","tags":["x_transferred"]},{"url":"https://github.com/OpenNMS/opennms/pull/6368","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"affected":[{"vendor":"opennms","product":"horizon","cpes":["cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"29.0.4","status":"affected","lessThan":"32.0.2","versionType":"maven"},{"version":"0","status":"unknown","lessThan":"29.0.4","versionType":"maven"}]},{"vendor":"opennms","product":"meridian","cpes":["cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2020.0.0","status":"affected","lessThanOrEqual":"2020.1.37","versionType":"maven"},{"version":"2021.0.0","status":"affected","lessThanOrEqual":"2021.1.29","versionType":"maven"},{"version":"2022.0.0","status":"affected","lessThanOrEqual":"2022.1.18","versionType":"maven"},{"version":"2023.0.0","status":"affected","lessThanOrEqual":"2023.1.5","versionType":"maven"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-08T12:59:42.694660Z","id":"CVE-2023-40313","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-08T13:04:43.357Z"}}]}}