GHSA-4M5R-W2RQ-Q54Q
Vulnerability from github – Published: 2024-11-15 15:41 – Updated: 2024-11-15 20:49Summary
The application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.
Details
User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources.
PoC
- Use an Admin role user to change the Display Name of a device into the payload
<img src="x" onerror="alert(document.cookie)">
2.1. Go to manage user and choose Manage Access
2.2. A pop-up will show
3.1. Create a new Alert Rule where it will check if the device is up or down by using ICMP and then add the rule to the device.
3.2. Once the device is down, there will be an alert in the Alerts Notifications
3.3. Hover over the Hostname will see a pop-up.
4.1. The same can be trigger in the Alert History once hover over the Device field.
5.1. The same can be trigger once hover over the Hostname field from the Event Log of the device.
6.1. The same can be trigger in the Outages function in the Logs of the device.
7.1. In the Active Alerts of the device.
8.2. In the Alert History of the device.
9.1. They can also be trigger in the dashboard.
10.1. Also if change the payload into <img src="x" onerror="alert(document['cookie'])">, it can also be trigger in the Availability Map.
Impact
It could allow authenticated users to execute arbitrary JavaScript code in the context of other users' sessions. Impacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 24.9.0"
},
"package": {
"ecosystem": "Packagist",
"name": "librenms/librenms"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.10.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-50355"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2024-11-15T15:41:38Z",
"nvd_published_at": "2024-11-15T16:15:36Z",
"severity": "HIGH"
},
"details": "### Summary\n\nThe application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.\n\n### Details\n\nUser with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources.\n\n### PoC\n\n1. Use an Admin role user to change the Display Name of a device into the payload `\u003cimg src=\"x\" onerror=\"alert(document.cookie)\"\u003e`\n\n\n\n2.1. Go to manage user and choose Manage Access\n\n\n\n2.2. A pop-up will show\n\n\n\n3.1. Create a new Alert Rule where it will check if the device is up or down by using ICMP and then add the rule to the device.\n\n\n\n3.2. Once the device is down, there will be an alert in the Alerts Notifications\n\n\n\n3.3. Hover over the Hostname will see a pop-up.\n\n\n\n4.1. The same can be trigger in the Alert History once hover over the Device field.\n\n\n\n5.1. The same can be trigger once hover over the Hostname field from the Event Log of the device.\n\n\n\n6.1. The same can be trigger in the Outages function in the Logs of the device.\n\n\n\n7.1. In the Active Alerts of the device.\n\n\n\n8.2. In the Alert History of the device.\n\n\n\n9.1. They can also be trigger in the dashboard.\n\n\n\n\n\n10.1. Also if change the payload into `\u003cimg src=\"x\" onerror=\"alert(document[\u0027cookie\u0027])\"\u003e`, it can also be trigger in the Availability Map.\n\n\n\n\n\n### Impact\n\nIt could allow authenticated users to execute arbitrary JavaScript code in the context of other users\u0027 sessions.\nImpacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.\n",
"id": "GHSA-4m5r-w2rq-q54q",
"modified": "2024-11-15T20:49:55Z",
"published": "2024-11-15T15:41:38Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50355"
},
{
"type": "WEB",
"url": "https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976"
},
{
"type": "PACKAGE",
"url": "https://github.com/librenms/librenms"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.