Lucene search

K
githubGitHub Advisory DatabaseGHSA-CWX6-CX7X-4Q34
HistoryApr 22, 2024 - 6:37 p.m.

LibreNMS vulnerable to SQL injection time-based leads to database extraction

2024-04-2218:37:21
CWE-89
GitHub Advisory Database
github.com
6
sql injection
librenms
database extraction
time-based
vulnerability
administrator credentials

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

15.5%

Summary

SQL injection vulnerability in POST /search/search=packages in LibreNMS 24.3.0 allows a user with global read privileges to execute SQL commands via the package parameter.

Details

There is a lack of hygiene of data coming from the user in line 83 of the file librenms/includes/html/pages/search/packages.inc.php
vulnerability

PoC

https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6

Impact

With this vulnerability, we can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials

Affected configurations

Vulners
Node
librenmslibrenmsRange<24.4.0
VendorProductVersionCPE
librenmslibrenms*cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

15.5%

Related for GHSA-CWX6-CX7X-4Q34