Описание
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
Ссылки
- Permissions RequiredThird Party Advisory
- ExploitThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- Permissions RequiredThird Party Advisory
- ExploitThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:librenms:librenms:1.46:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.66987
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
EPSS
Процентиль: 98%
0.66987
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78