{"uuid": "77bf2d8c-eb19-4af9-b427-2775fa9dfa96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40315", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4277", "content": "#ExploitObserverAlert\n\nMSF/exploit_linux/http/opennms_horizon_authenticated_rce\n\nDESCRIPTION: Exploit Observer has 12 entries in 4 file formats related to MSF/exploit_linux/http/opennms_horizon_authenticated_rce. This module exploits built-in functionality in OpenNMS Horizon in order to execute arbitrary commands as the opennms user. For versions 32.0.2 and higher, this module requires valid credentials for a user with ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST. For versions 32.0.1 and lower, credentials are required for a user with ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges. In that case, the module will automatically escalate privileges via CVE-2023-40315 or CVE-2023-0872 if necessary. This module has been successfully tested against OpenNMS version 31.0.7", "creation_timestamp": "2024-03-21T21:45:46.000000Z"}