Headline
GHSA-x8gm-j36p-fppf: LibreNMS vulnerable to Stored Cross-site Scripting via File Upload
Summary
Stored Cross-Site Scripting (XSS) can archive via Uploading a new Background for a Custom Map.
Details
Users with “admin” role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger onload. This led to Stored Cross-Site Scripting (XSS).
PoC
Login using an Admin role account.
Go over to "$URL/maps/custom", the Manage Custom Maps.
Create a new map then choose to edit it.
Choose the “Set Background” option.
Choose to upload a SVG file that have this content.
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)">
<circle cx="50" cy="50" r="40" />
</svg>
Once uploaded, there should be a link to the SVG return in the POST request to the API "$URL/maps/custom/1/background".
Go over to that link on browser, should see a pop-up.
Impact
Attacker can use this to perform malicious java script code for malicious intent. This would impact other Admin role users and the Global Read role users. Normal users does not have permission to read the file, so they are not affected.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-47528
LibreNMS vulnerable to Stored Cross-site Scripting via File Upload
Low severity GitHub Reviewed Published Oct 1, 2024 in librenms/librenms • Updated Oct 1, 2024
Package
composer librenms/librenms (Composer)
Affected versions
< 24.9.0
Summary
Stored Cross-Site Scripting (XSS) can archive via Uploading a new Background for a Custom Map.
Details
Users with “admin” role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger onload. This led to Stored Cross-Site Scripting (XSS).
PoC
Login using an Admin role account.
Go over to "$URL/maps/custom", the Manage Custom Maps.
Create a new map then choose to edit it.
Choose the “Set Background” option.
Choose to upload a SVG file that have this content.
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)“> <circle cx="50” cy="50" r="40" /> </svg>
Once uploaded, there should be a link to the SVG return in the POST request to the API "$URL/maps/custom/1/background".
Go over to that link on browser, should see a pop-up.
Impact
Attacker can use this to perform malicious java script code for malicious intent.
This would impact other Admin role users and the Global Read role users. Normal users does not have permission to read the file, so they are not affected.
References
- GHSA-x8gm-j36p-fppf
- https://nvd.nist.gov/vuln/detail/CVE-2024-47528
- librenms/librenms@d959bf1
Published to the GitHub Advisory Database
Oct 1, 2024