Description
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
Remediation
References
https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929
https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2
Related Vulnerabilities
CVE-2022-0613 Vulnerability in npm package urijs
CVE-2022-34115 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2014-0035 Vulnerability in maven package org.apache.cxf:cxf-bundle-minimal
CVE-2022-21208 Vulnerability in npm package node-opcua
CVE-2023-26476 Vulnerability in maven package org.xwiki.platform:xwiki-platform-livetable-ui