GHSA-C86Q-RJ37-8F85

Vulnerability from github – Published: 2024-11-15 15:17 – Updated: 2024-11-15 20:49
VLAI?
Summary
LibreNMS has a stored XSS in ExamplePlugin with Device's Notes
Details

Summary

The application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.

Details

User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger.

PoC

  1. As an admin user, enable the ExamplePlugin.

image

  1. Add the payload <img src="x" onerror="alert(document.cookie)"> into the device Notes

image

  1. Once visit the Overview of the Device, a pop-up will show up.

image

Impact

It could allow authenticated users to execute arbitrary JavaScript code in the context of other users' sessions. Impacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.

Show details on source website

{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 24.9.0"
      },
      "package": {
        "ecosystem": "Packagist",
        "name": "librenms/librenms"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "24.10.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2024-49758"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-15T15:17:33Z",
    "nvd_published_at": "2024-11-15T16:15:34Z",
    "severity": "MODERATE"
  },
  "details": "### Summary\n\nThe application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.\n\n### Details\n\nUser with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device\u0027s Notes, its will be trigger.\n\n### PoC\n\n1. As an admin user, enable the ExamplePlugin.\n\n![image](https://github.com/user-attachments/assets/409f3a0c-7fac-46e3-8140-84749a120dd9)\n\n2. Add the payload `\u003cimg src=\"x\" onerror=\"alert(document.cookie)\"\u003e` into the device Notes\n\n![image](https://github.com/user-attachments/assets/c2a57dbd-ea07-4166-8b29-61be6ad6c2b6)\n\n3. Once visit the Overview of the Device, a pop-up will show up.\n\n![image](https://github.com/user-attachments/assets/3c9b87c3-d010-49e7-bd13-4a715db4e0c3)\n\n### Impact\n\nIt could allow authenticated users to execute arbitrary JavaScript code in the context of other users\u0027 sessions.\nImpacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.\n",
  "id": "GHSA-c86q-rj37-8f85",
  "modified": "2024-11-15T20:49:46Z",
  "published": "2024-11-15T15:17:33Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/librenms/librenms/security/advisories/GHSA-c86q-rj37-8f85"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49758"
    },
    {
      "type": "WEB",
      "url": "https://github.com/librenms/librenms/commit/24b142d753898e273ec20b542a27dd6eb530c7d8"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/librenms/librenms"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "LibreNMS has a stored XSS in ExamplePlugin with Device\u0027s Notes"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…