| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.opennms:opennms-base-assembly | maven |
| < 32.0.2 |
| 32.0.2 |
The vulnerability stems from an exposed BeanShell interpreter in server mode. The patch removes the 'server(12345)' call that starts this dangerous service. BeanShell's remote server functionality allows executing arbitrary Java code through its interface, which aligns with the CWE-94 code injection description. The direct removal of this function in the security fix confirms its role in the vulnerability.
KEV Misses 88% of Exploited CVEs- Get the report