LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Reflected Cross-Site Scripting (XSS) vulnerability in the "section" parameter of the "logs" tab of a device allows attackers to inject arbitrary JavaScript. This vulnerability results in the execution of malicious code when a user accesses the page with a malicious "section" parameter, potentially compromising their session and enabling unauthorized actions. The issue arises from a lack of sanitization in the "report_this()" function. This vulnerability is fixed in 24.10.0.
References
Link | Resource |
---|---|
https://github.com/librenms/librenms/commit/6a14a9bd767c6e452e4df77a24126c3eeb93dcbf | Patch |
https://github.com/librenms/librenms/security/advisories/GHSA-v7w9-63xh-6r3w | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-11-15 16:15
Updated : 2024-11-21 23:37
NVD link : CVE-2024-50351
Mitre link : CVE-2024-50351
CVE.ORG link : CVE-2024-50351
JSON object : View
Products Affected
librenms
- librenms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')