CVE-2018-20434
LibreNMS - addhost Command Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
LibreNMS 1.46 permite a los atacantes remotos ejecutar comandos OS arbitrarios mediante el uso del parámetro $_POST['community'] en html/pages/addhost.inc.php durante la creación de un nuevo dispositivo y posteriormente haciendo una petición /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost que desencadene una mala gestión del comando html/includes/output/capture.inc.php
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-24 CVE Reserved
- 2019-04-24 CVE Published
- 2019-04-25 First Exploit
- 2024-08-05 CVE Updated
- 2024-10-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html | X_refsource_misc | |
http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/46970 | 2019-06-05 | |
https://www.exploit-db.com/exploits/47044 | 2019-06-28 | |
https://github.com/mhaskar/CVE-2018-20434 | 2019-04-25 | |
https://gist.github.com/mhaskar/516df57aafd8c6e3a1d70765075d372d | 2024-08-05 | |
https://shells.systems/librenms-v1-46-remote-code-execution-cve-2018-20434 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|