Lucene search

K
githubGitHub Advisory DatabaseGHSA-RQ42-58QF-V3QX
HistoryNov 17, 2023 - 9:38 p.m.

LibreNMS vulnerable to rate limiting bypass on login page

2023-11-1721:38:42
CWE-307
CWE-770
GitHub Advisory Database
github.com
5
librenms
rate limiting bypass
login page
get request
authentication
burpsuite
intruder attack
passwords
bruteforce
user accounts
impact
web servers logs
victim credentials

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

36.0%

Summary

Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that.

PoC

Go to /?username=admin&password=password&submit=
Capture request in Burpsuite intruder and add payload marker at password parameter value.
Start the attack after adding your password list
We have added 74 passwords
Check screenshot for more info
<img width=“1241” alt=“Screenshot 2023-11-06 at 8 55 19 PM” src=“https://user-images.githubusercontent.com/31764504/280905148-42274f1e-f869-4145-95b4-71c0bffde3a0.png”>

Impact

An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.

Affected configurations

Vulners
Node
librenmslibrenmsRange<23.11.0
CPENameOperatorVersion
librenms/librenmslt23.11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

36.0%

Related for GHSA-RQ42-58QF-V3QX