Описание
LibreNMS uses Improper Sanitization on Service template name leads to Stored XSS
Summary
There is improper sanitization on Service template name which is reflecting in delete button onclick event. This value can be modified and crafted as any other javascript code.
Vulnerable Code
Above is vulnerable code line which needs to be properly sanitized
PoC
- Go to /services/templates
- Enter name as
testing', '14', 'http://172.105.62.194:8000/services/templates/14');alert(1);// - Submit it and try to delete it, you will see popup
If you inspect element on delete button, you will notice this:-

Impact
Cross site scripting can lead to cookie stealing or an attacker can execute any other feature using this feature.
Ссылки
- https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw
- https://nvd.nist.gov/vuln/detail/CVE-2024-32479
- https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b
- https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23
Пакеты
librenms/librenms
< 24.4.0
24.4.0
Связанные уязвимости
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability.