Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-72m9-7c8x-pmmw

Опубликовано: 22 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

LibreNMS uses Improper Sanitization on Service template name leads to Stored XSS

Summary

There is improper sanitization on Service template name which is reflecting in delete button onclick event. This value can be modified and crafted as any other javascript code.

Vulnerable Code

https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23

Above is vulnerable code line which needs to be properly sanitized

PoC

  1. Go to /services/templates
  2. Enter name as testing', '14', 'http://172.105.62.194:8000/services/templates/14');alert(1);//
  3. Submit it and try to delete it, you will see popup

If you inspect element on delete button, you will notice this:- Screenshot 2023-11-23 at 9 30 24 PM

Impact

Cross site scripting can lead to cookie stealing or an attacker can execute any other feature using this feature.

Пакеты

Наименование

librenms/librenms

composer
Затронутые версииВерсия исправления

< 24.4.0

24.4.0

EPSS

Процентиль: 71%
0.00681
Низкий

7.1 High

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 7.1
nvd
почти 2 года назад

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability.

EPSS

Процентиль: 71%
0.00681
Низкий

7.1 High

CVSS3

Дефекты

CWE-79