Headline
GHSA-g84x-g96g-rcjc: Librenms has a reflected XSS on error alert
XSS on the parameters:/addhost
-> param: community
of Librenms versions 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
Navigate to the /addhost path.
Fill in all required fields.
In the Community field, enter the following payload:
"><img src=a onerror="alert(1)">
.Submit the form to save changes. 5 The script will execute when the error alert “No reply with community + payload” appears.
Impact:
Execution of Malicious Code
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-g84x-g96g-rcjc
Librenms has a reflected XSS on error alert
Moderate severity GitHub Reviewed Published Jan 16, 2025 in librenms/librenms • Updated Jan 16, 2025
Package
composer librenms/librenms (Composer)
Affected versions
<= 24.10.1
XSS on the parameters:/addhost -> param: community
of Librenms versions 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
Navigate to the /addhost path.
Fill in all required fields.
In the Community field, enter the following payload: "><img src=a onerror="alert(1)">.
Submit the form to save changes.
5 The script will execute when the error alert “No reply with community + payload” appears.
Impact:
Execution of Malicious Code
References
- GHSA-g84x-g96g-rcjc
Published to the GitHub Advisory Database
Jan 16, 2025
Last updated
Jan 16, 2025