LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0.
References
Link | Resource |
---|---|
https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976 | Patch |
https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 14:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976 - Patch | |
References | () https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* | |
First Time |
Librenms librenms
Librenms |
18 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 16:15
Updated : 2024-11-20 14:39
NVD link : CVE-2024-50355
Mitre link : CVE-2024-50355
CVE.ORG link : CVE-2024-50355
JSON object : View
Products Affected
librenms
- librenms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')