ghsa-8phr-637g-pxrg
Vulnerability from github
Published
2023-11-17 21:51
Modified
2023-11-17 21:51
Summary
LibreNMS Cross-site Scripting at Device groups Deletion feature
Details

Summary

XSS attacks occurs when application is not sanitising inputs properly and rendering the code from user input to browser which could allow an attacker to execute malicious javascript code.

PoC

  1. Login
  2. Create a device group in /device-groups
  3. Name it as "><img src=x onerror=alert(1);>
  4. save it
  5. Go to services and create a service template and add that device group into that and save it
  6. After that go back to device groups and delete that device, you will see XSS payload popup in message Screenshot 2023-11-08 at 9 15 56 PM

Vulnerable code:

https://github.com/librenms/librenms/blob/63eeeb71722237d1461a37bb6da99fda25e02c91/app/Http/Controllers/DeviceGroupController.php#L173C21-L173C21

Line 173 is not sanitizing device name properly Screenshot 2023-11-08 at 9 26 14 PM

Impact

Cross site scripting can lead to cookie stealing attacks

Show details on source website


{
  "affected": [
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "librenms/librenms"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "23.11.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2023-48295"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2023-11-17T21:51:24Z",
    "nvd_published_at": "2023-11-17T21:15:07Z",
    "severity": "MODERATE"
  },
  "details": "### Summary\nXSS attacks occurs when application is not sanitising inputs properly and rendering the code from user input to browser which could allow an attacker to execute malicious javascript code.\n\n### PoC\n1. Login\n2. Create a device group in /device-groups\n3. Name it as `\"\u003e\u003cimg src=x onerror=alert(1);\u003e`\n4. save it\n5. Go to services and create a service template and add that device group into that and save it\n6. After that go back to device groups and delete that device, you will see XSS payload popup in message\n\u003cimg width=\"1043\" alt=\"Screenshot 2023-11-08 at 9 15 56\u202fPM\" src=\"https://user-images.githubusercontent.com/31764504/281489434-9beaebd6-b9ce-4098-a8e0-d67b185062b5.png\"\u003e\n\n\n### Vulnerable code:\nhttps://github.com/librenms/librenms/blob/63eeeb71722237d1461a37bb6da99fda25e02c91/app/Http/Controllers/DeviceGroupController.php#L173C21-L173C21\n\nLine 173 is not sanitizing device name properly\n\u003cimg width=\"793\" alt=\"Screenshot 2023-11-08 at 9 26 14\u202fPM\" src=\"https://user-images.githubusercontent.com/31764504/281490570-5ae6e73a-37ce-4683-8bc8-81655abd8d09.png\"\u003e\n\n### Impact\nCross site scripting can lead to cookie stealing attacks",
  "id": "GHSA-8phr-637g-pxrg",
  "modified": "2023-11-17T21:51:24Z",
  "published": "2023-11-17T21:51:24Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48295"
    },
    {
      "type": "WEB",
      "url": "https://github.com/librenms/librenms/commit/faf66035ea1f4c1c4f34559b9d0ed40ee4a19f90"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/librenms/librenms"
    },
    {
      "type": "WEB",
      "url": "https://github.com/librenms/librenms/blob/63eeeb71722237d1461a37bb6da99fda25e02c91/app/Http/Controllers/DeviceGroupController.php#L173C21-L173C21"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "LibreNMS Cross-site Scripting at Device groups Deletion feature"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…