Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-2f4w-6mc7-4w78: LibreNMS Display Name 2 Stored Cross-site Scripting vulnerability

StoredXSS-LibreNMS-Display Name 2

Description:

XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):/device/$DEVICE_ID/edit -> param: display

of Librenms versions 24.11.0 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.
  2. Edit the newly created device by going to the “Device Settings” section.
  3. In the “Display Name” field, enter the following payload: "><img src onerror="alert(document.cookie)">. image
  4. Save the changes.
  5. The XSS payload is triggered when navigating to the path /device/$DEVICE_ID/logs and hovering over a type containing a tag (such as Core 1 in the image). image

Impact:

Execution of Malicious Code

ghsa
#xss#vulnerability#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-56144

LibreNMS Display Name 2 Stored Cross-site Scripting vulnerability

Moderate severity GitHub Reviewed Published Jan 16, 2025 in librenms/librenms • Updated Jan 16, 2025

Package

composer librenms/librenms (Composer)

Affected versions

= 24.11.10

StoredXSS-LibreNMS-Display Name 2

Description:

XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):/device/$DEVICE_ID/edit -> param: display

of Librenms versions 24.11.0 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.

  2. Edit the newly created device by going to the “Device Settings” section.

  3. In the “Display Name” field, enter the following payload: "><img src onerror="alert(document.cookie)">.

  4. Save the changes.

  5. The XSS payload is triggered when navigating to the path /device/$DEVICE_ID/logs and hovering over a type containing a tag (such as Core 1 in the image).

Impact:

Execution of Malicious Code

References

  • GHSA-2f4w-6mc7-4w78
  • librenms/librenms#16886
  • librenms/librenms@c63c912

Published to the GitHub Advisory Database

Jan 16, 2025

Last updated

Jan 16, 2025

ghsa: Latest News

GHSA-744g-7qm9-hjh9: The TYPO3 CMS Backend has Broken Authentication in Backend MFA