Fixed
Details
Assignee
Jeff GehlbachJeff GehlbachReporter
Jeff GehlbachJeff GehlbachComponents
Fix versions
Affects versions
Priority
Blocker
Details
Details
Assignee
Jeff Gehlbach
Jeff GehlbachReporter
Jeff Gehlbach
Jeff GehlbachComponents
Fix versions
Affects versions
Priority
PagerDuty
PagerDuty
PagerDuty
Created May 23, 2014 at 1:52 PM
Updated January 30, 2023 at 6:35 PM
Resolved May 23, 2014 at 2:01 PM
See support ticket https://mynms.opennms.com/Ticket/Display.html?id=3040
There is a reflected XSS vulnerability in alarm/details.htm which can be triggered by entering <script>window.alert("gotcha!")</script> as the alarm ID in the search box of alarm/index.jsp.
There is an additional XSS vulnerability that manifests throughout the webapp if a node's label contains a <script> tag. An untrusted actor with PROVISION_ROLE could easily exploit this vector.