Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c86q-rj37-8f85

Опубликовано: 15 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

LibreNMS has a stored XSS in ExamplePlugin with Device's Notes

Summary

The application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.

Details

User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger.

PoC

  1. As an admin user, enable the ExamplePlugin.

image

  1. Add the payload <img src="x" onerror="alert(document.cookie)"> into the device Notes

image

  1. Once visit the Overview of the Device, a pop-up will show up.

image

Impact

It could allow authenticated users to execute arbitrary JavaScript code in the context of other users' sessions. Impacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.

Пакеты

Наименование

librenms/librenms

composer
Затронутые версииВерсия исправления

<= 24.9.0

24.10.0

EPSS

Процентиль: 19%
0.00061
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.8
nvd
около 1 года назад

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger. This vulnerability is fixed in 24.10.0.

EPSS

Процентиль: 19%
0.00061
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-79