Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-rq42-58qf-v3qx: LibreNMS vulnerable to rate limiting bypass on login page

Summary

Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that.

PoC

Go to /?username=admin&password=password&submit= Capture request in Burpsuite intruder and add payload marker at password parameter value. Start the attack after adding your password list We have added 74 passwords Check screenshot for more info <img width="1241" alt="Screenshot 2023-11-06 at 8 55 19 PM" src="https://user-images.githubusercontent.com/31764504/280905148-42274f1e-f869-4145-95b4-71c0bffde3a0.png">

Impact

An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.

ghsa
#web#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-46745

LibreNMS vulnerable to rate limiting bypass on login page

Moderate severity GitHub Reviewed Published Nov 17, 2023 in librenms/librenms • Updated Nov 17, 2023

Package

composer librenms/librenms (Composer)

Affected versions

< 23.11.0

Summary

Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that.

PoC

Go to /?username=admin&password=password&submit=
Capture request in Burpsuite intruder and add payload marker at password parameter value.
Start the attack after adding your password list
We have added 74 passwords
Check screenshot for more info

Impact

An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.

References

  • GHSA-rq42-58qf-v3qx
  • librenms/librenms#15558
  • librenms/librenms@7c006e9
  • https://github.com/librenms/librenms/releases/tag/23.11.0

Published to the GitHub Advisory Database

Nov 17, 2023

Last updated

Nov 17, 2023

Related news

CVE-2023-46745: Rate limiting Bypass on login page

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions the login method has no rate limit. An attacker may be able to leverage this vulnerability to gain access to user accounts. This issue has been addressed in version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.