gsd-2023-0815
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-0815", "id": "GSD-2023-0815" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-0815" ], "details": "Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.", "id": "GSD-2023-0815", "modified": "2023-12-13T01:20:22.634390Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@opennms.com", "ID": "CVE-2023-0815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Meridian", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2020.1.0", "version_value": "2020.1.32" }, { "version_affected": "\u003c", "version_name": "2021.1.0", "version_value": "2021.1.24" }, { "version_affected": "\u003c", "version_name": "2022.1.0", "version_value": "2022.1.13" } ] } } ] }, "vendor_name": "The OpenNMS Group " }, { "product": { "product_data": [ { "product_name": "Horizon", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "26.0.0", "version_value": "31.0.4" } ] } } ] }, "vendor_name": "The OpenNMS Group" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet." } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-532", "lang": "eng", "value": "CWE-532 Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenNMS/opennms/pull/5741/files", "refsource": "MISC", "url": "https://github.com/OpenNMS/opennms/pull/5741/files" }, { "name": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13", "refsource": "MISC", "url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13" } ] }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\u0026lt;\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003elogger\u003c/span\u003e \u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003ename\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e=\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eorg.eclipse.jetty.server.HttpInput\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e \u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eadditivity\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e=\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003efalse\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e \u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003elevel\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e=\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eINFO\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\u0026gt;\u003c/span\u003e\n\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e2\u003c/span\u003e \u003cbr\u003e \u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\u0026lt;\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eappender-ref\u003c/span\u003e \u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eref\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e=\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003eRoutingAppender\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\"\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e/\u0026gt;\u003c/span\u003e\n\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e3\u003cbr\u003e\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\u0026lt;/\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003elogger\u003c/span\u003e\u003cspan style=\"background-color: rgb(244, 245, 247);\"\u003e\u0026gt;\u003cbr\u003e\u003cbr\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/OpenNMS/opennms/pull/5741\"\u003ehttps://github.com/OpenNMS/opennms/pull/5741\u003cbr\u003e\u003cbr\u003e\u003c/a\u003eor upgrade to a newer version of Meridian or Horizon. \u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "\u003clogger name=\"org.eclipse.jetty.server.HttpInput\" additivity=\"false\" level=\"INFO\"\u003e\n2 \n \u003cappender-ref ref=\"RoutingAppender\"/\u003e\n3\n\u003c/logger\u003e\n\n https://github.com/OpenNMS/opennms/pull/5741\n\n https://github.com/OpenNMS/opennms/pull/5741 or upgrade to a newer version of Meridian or Horizon. \n\n" } ], "source": { "discovery": "INTERNAL" } }, "gitlab.com": { "advisories": [ { "affected_range": "(,31.0.4)", "affected_versions": "All versions before 31.0.4", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2023-03-08", "description": "Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet.", "fixed_versions": [ "31.0.4" ], "identifier": "CVE-2023-0815", "identifiers": [ "GHSA-9xpj-mvp2-3943", "CVE-2023-0815" ], "not_impacted": "All versions starting from 31.0.4", "package_slug": "maven/org.opennms/opennms", "pubdate": "2023-02-23", "solution": "Upgrade to version 31.0.4 or above.", "title": "Insertion of Sensitive Information into Log File", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2023-0815", "https://github.com/OpenNMS/opennms/pull/5741/files", "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13", "https://github.com/OpenNMS/opennms/releases/tag/opennms-31.0.4-1", "https://github.com/advisories/GHSA-9xpj-mvp2-3943" ], "uuid": "5a89cbb0-c60b-4b1e-89c5-34724ac10098" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "31.0.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2023.1.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@opennms.com", "ID": "CVE-2023-0815" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization\u0027s private networks and should not be directly accessible from the Internet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/OpenNMS/opennms/pull/5741/files", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenNMS/opennms/pull/5741/files" }, { "name": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13", "refsource": "MISC", "tags": [ "Release Notes" ], "url": "https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-03-07T22:29Z", "publishedDate": "2023-02-23T15:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…