Beyond Security Blog
laptop and network monitoring icons on blue gradient vector

OpenNMS Horizon before 26.0.1 Deserialization of Untrusted Data Vulnerability

Summary

I began to have a look at your software (suite) OpenNMS. Yesterday, I found that one could get Remote Code Execution (RCE) via malicious MQ messages on the Horizon base station from a remote machine with minion credentials. At least that was the case I found quickly to be valid with respect to the role model. Find attached a short write-up describing a little bit more on the exploitation steps.

Credit:

The information has been provided by Jeff Gehlbach

The original article can be found at:https://github.com/OpenNMS/opennms/releases/tag/opennms-26.0.1-1

Details

An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user regardless of its assigned permissions.

Vulnerable Systems:

OpenNMS Horizon before 26.0.1

OpenNMS Meridian before 2018.1.19

OpenNMS 2019 before 2019.1.7

CVE Information:

CVE-2020-12760

Disclosure Timeline:
Published Date:5/11/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us

Want to learn more? Fill out the form below and we'll be in touch shortly.

Marketing by
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Reviews