OpenNMS Java Object Deserialization RCE

Critical Nessus Plugin ID 87311


The remote OpenNMS server is affected by a remote code execution vulnerability.


The remote OpenNMS server is affected by a remote code execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this, by sending a crafted RMI request, to execute arbitrary code on the target host.


Ensure that all exposed ports used by the OpenNMS server, including the rmi_registry port which exists in default configurations on port 1099, are firewalled from any public networks.

See Also

Plugin Details

Severity: Critical

ID: 87311

File Name: opennms_java_serialize.nasl

Version: $Revision: 1.3 $

Type: remote

Family: Misc.

Published: 2015/12/10

Modified: 2016/04/28

Dependencies: 22227

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:opennms:opennms

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2015/01/28

Reference Information

OSVDB: 129952, 130290, 130424

CERT: 576313