// For flags

CVE-2023-40313

Disable BeanShell Interpreter Remote Server Mode

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.

Un intérprete de BeanShell en modo servidor remoto se ejecuta en versiones de OpenNMS Horizon anteriores a 32.0.2 y en versiones de Meridian relacionadas, lo que podría permitir la ejecución remota arbitraria de código Java. La solución es actualizar a Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 u Horizon 32.0.2 o posterior. Las instrucciones de instalación de Meridian y Horizon indican que están pensadas para instalarse dentro de las redes privadas de una organización y que no debe accederse a ellas directamente desde Internet.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-08-14 CVE Reserved
  • 2023-08-17 CVE Published
  • 2024-10-08 CVE Updated
  • 2024-11-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Opennms
Search vendor "Opennms"
Horizon
Search vendor "Opennms" for product "Horizon"
< 32.0.2
Search vendor "Opennms" for product "Horizon" and version " < 32.0.2"
-
Affected
Opennms
Search vendor "Opennms"
Meridian
Search vendor "Opennms" for product "Meridian"
< 2020.1.38
Search vendor "Opennms" for product "Meridian" and version " < 2020.1.38"
-
Affected
Opennms
Search vendor "Opennms"
Meridian
Search vendor "Opennms" for product "Meridian"
>= 2021.1.0 < 2021.1.30
Search vendor "Opennms" for product "Meridian" and version " >= 2021.1.0 < 2021.1.30"
-
Affected
Opennms
Search vendor "Opennms"
Meridian
Search vendor "Opennms" for product "Meridian"
>= 2022.1.0 < 2022.1.19
Search vendor "Opennms" for product "Meridian" and version " >= 2022.1.0 < 2022.1.19"
-
Affected
Opennms
Search vendor "Opennms"
Meridian
Search vendor "Opennms" for product "Meridian"
>= 2023.1.0 < 2023.1.6
Search vendor "Opennms" for product "Meridian" and version " >= 2023.1.0 < 2023.1.6"
-
Affected