Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32461
HistoryApr 22, 2024 - 9:54 p.m.

CVE-2024-32461 LibreNMS vulnerable to time-based SQL injection that leads to database extraction

2024-04-2221:54:01
CWE-89
GitHub_M
www.cve.org
2
librenms
sql injection
network monitoring
php
mysql
snmp
vulnerability
database extraction
patch
cve-2024-32461

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

7.4

Confidence

High

EPSS

0

Percentile

15.5%

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.

CNA Affected

[
  {
    "vendor": "librenms",
    "product": "librenms",
    "versions": [
      {
        "version": "< 24.4.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

7.4

Confidence

High

EPSS

0

Percentile

15.5%

Related for CVELIST:CVE-2024-32461