Librenms has a reflected XSS on error alert
Moderate severity
GitHub Reviewed
Published
Jan 16, 2025
in
librenms/librenms
•
Updated Jan 17, 2025
Description
Published to the GitHub Advisory Database
Jan 16, 2025
Reviewed
Jan 16, 2025
Published by the National Vulnerability Database
Jan 16, 2025
Last updated
Jan 17, 2025
XSS on the parameters:
/addhost
-> param: communityof Librenms versions 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
Navigate to the /addhost path.
Fill in all required fields.
In the Community field, enter the following payload:
"><img src=a onerror="alert(1)">
.Submit the form to save changes.
5 The script will execute when the error alert "No reply with community + payload" appears.
Impact:
Execution of Malicious Code
References