Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-27vf-3g4f-6jp7: LibreNMS Ports Stored Cross-site Scripting vulnerability

StoredXSS-LibreNMS-Ports

Description:

Stored XSS on the parameter: /ajax_form.php -> param: descr

Request:

POST /ajax_form.php HTTP/1.1
Host: <your_host>
X-Requested-With: XMLHttpRequest
X-CSRF-TOKEN: <your_XSRF_token>
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Cookie: <your_cookie>

type=update-ifalias&descr=%22%3E%3Cimg+src+onerror%3D%22alert(1)%22%3E&ifName=lo&port_id=1&device_id=1

of Librenms version 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.
  2. Edit the newly created device and select the “ports” section.
  3. In the “Description” field, enter the following payload: "><img src onerror="alert(1)">.
  4. Save the changes.
  5. The XSS vulnerability is triggered when accessing the “ports” tab, and the payload is executed again when hovering over the modified value in the “Port” field.

Payload: payload

Executes: image The script execution vulnerability in the description field, as shown in the image, occurs at Line 63 of functions.inc.php

$overlib_content = '<div class=overlib><span class=overlib-text>' . $text . '</span><br />';

image

Impact:

Execution of Malicious Code

ghsa
#xss#csrf#vulnerability#git#php#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-27vf-3g4f-6jp7

LibreNMS Ports Stored Cross-site Scripting vulnerability

Moderate severity GitHub Reviewed Published Jan 16, 2025 in librenms/librenms • Updated Jan 16, 2025

Package

composer librenms/librenms (Composer)

Affected versions

< 24.10.1

StoredXSS-LibreNMS-Ports

Description:

Stored XSS on the parameter:
/ajax_form.php -> param: descr

Request:

POST /ajax_form.php HTTP/1.1 Host: <your_host> X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: <your_XSRF_token> Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: <your_cookie>

type=update-ifalias&descr=%22%3E%3Cimg+src+onerror%3D%22alert(1)%22%3E&ifName=lo&port_id=1&device_id=1

of Librenms version 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.
  2. Edit the newly created device and select the “ports” section.
  3. In the “Description” field, enter the following payload: "><img src onerror="alert(1)">.
  4. Save the changes.
  5. The XSS vulnerability is triggered when accessing the “ports” tab, and the payload is executed again when hovering over the modified value in the “Port” field.

Payload:

Executes:

The script execution vulnerability in the description field, as shown in the image, occurs at Line 63 of functions.inc.php

$overlib_content = ‘<div class=overlib><span class=overlib-text>’ . $text . '</span><br />’;

Impact:

Execution of Malicious Code

References

  • GHSA-27vf-3g4f-6jp7
  • librenms/librenms#16721
  • librenms/librenms@9d07d16

Published to the GitHub Advisory Database

Jan 16, 2025

Last updated

Jan 16, 2025

ghsa: Latest News

GHSA-g84x-g96g-rcjc: Librenms has a reflected XSS on error alert