Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pm8j-3v64-92cq

Опубликовано: 16 янв. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.6

Описание

LibreNMS Display Name Stored Cross-site Scripting vulnerability

Description:

XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):/device/$DEVICE_ID/edit -> param: display

of Librenms versions 24.9.0, 24.10.0, and 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.

  2. Edit the newly created device by going to the "Device Settings" section.

  3. In the "Display Name" field, enter the following payload: "><script>alert(1)</script>. Screenshot from 2024-11-06 09-41-37

  4. Save the changes.

  5. The XSS payload triggers when accessing the "/apps" path (if an application was previously added). Screenshot from 2024-11-06 09-42-05

Additional PoC:

  1. In the "Display Name" field, enter the following payload: "><img src onerror="alert(1)">. image

  2. The XSS vulnerability is triggered when accessing the "/ports" path, and the payload executes when hovering over the modified value in the "Port" field. image

  • on /device/$DEVICE_ID/ports/arp path: image

  • on /device/$DEVICE_ID/logs path: image

  • on /search/search=arp/ path: image

Impact:

Execution of Malicious Code

Пакеты

Наименование

librenms/librenms

composer
Затронутые версииВерсия исправления

>= 24.9.0, < 24.10.1

24.11.0

EPSS

Процентиль: 23%
0.00079
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.6
nvd
около 1 года назад

librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 23%
0.00079
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-79