Page 2 of 55 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. • https://github.com/librenms/librenms/commit/83fe4b10c440d69a47fe2f8616e290ba2bd3a27c https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability. LibreNMS es un sistema de monitoreo de red de código abierto basado en PHP/MySQL/SNMP. Antes de la versión 24.4.0, había una sanitización inadecuada en el nombre de la plantilla "Servicio", lo que puede provocar que se almacenen Cross Site Scripting. • https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23 https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability. LibreNMS es un sistema de monitoreo de red de código abierto basado en PHP/MySQL/SNMP. • https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6 https://github.com/librenms/librenms/commit/d29201fce134347f891102699fbde7070debee33 https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions the login method has no rate limit. An attacker may be able to leverage this vulnerability to gain access to user accounts. This issue has been addressed in version 23.11.0. Users are advised to upgrade. • https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions of LibreNMS when a user accesses their device dashboard, one request is sent to `graph.php` to access graphs generated on the particular Device. This request can be accessed by a low privilege user and they can enumerate devices on librenms with their id or hostname. Leveraging this vulnerability a low privilege user can see all devices registered by admin users. This vulnerability has been addressed in commit `489978a923` which has been included in release version 23.11.0. • https://github.com/librenms/librenms/blob/fa93034edd40c130c2ff00667ca2498d84be6e69/html/graph.php#L19C1-L25C2 https://github.com/librenms/librenms/commit/489978a923ed52aa243d3419889ca298a8a6a7cf https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •