Show filters
82 Total Results
Displaying 71-80 of 82
Sort by:
Attacker Value
Unknown
CVE-2019-10671
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.
0
Attacker Value
Unknown
CVE-2019-10670
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. Many of the scripts rely on the function mysqli_escape_real_string for filtering data. However, this is particularly ineffective when returning user supplied input in an HTML or a JavaScript context, resulting in unsafe data being injected into these contexts, leading to attacker controlled JavaScript executing in the browser. One example of this is the string parameter in html/pages/inventory.inc.php.
0
Attacker Value
Unknown
CVE-2019-10666
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring.
0
Attacker Value
Unknown
CVE-2019-10665
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (html/includes/graphs/common.inc.php and html/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php script. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.
0
Attacker Value
Unknown
CVE-2019-10669
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru().
0
Attacker Value
Unknown
CVE-2019-10667
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. Information disclosure can occur: an attacker can fingerprint the exact code version installed and disclose local file paths.
0
Attacker Value
Unknown
CVE-2019-10668
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
0
Attacker Value
Unknown
CVE-2019-15230
Disclosure Date: August 28, 2019 (last updated November 27, 2024)
LibreNMS v1.54 has XSS in the Create User, Inventory, Add Device, Notifications, Alert Rule, Create Maintenance, and Alert Template sections of the admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account.
0
Attacker Value
Unknown
CVE-2018-20434
Disclosure Date: April 24, 2019 (last updated November 27, 2024)
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
0
Attacker Value
Unknown
CVE-2018-20678
Disclosure Date: March 28, 2019 (last updated November 27, 2024)
LibreNMS through 1.47 allows SQL injection via the html/ajax_table.php sort[hostname] parameter, exploitable by authenticated users during a search.
0