OpenNMS Multiple Vulnerabilities
An input validation problem exists within OpenNMS which allows injecting CR (carriage return - %0D or ) and LF (line feed - %0A or ) characters into the server HTTP response header, resulting in a HTTP Response Splitting vulnerability. This vulnerability is possible because the application fails to validate user supplied input, returning it un-sanitized within the server HTTP response header back to the client. This vulnerability not only gives attackers control of the remaining headers and body of the server response, but also allows them to create additional responses entirely under their control. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, and influence or misrepresent how web content is served, cached, or interpreted. Other attacks are also possible.