Cross-site Scripting (XSS) - Generic in librenms/librenms

Valid

Reported on

Feb 12th 2022


Description

Cross-Site Scripting vulnerability in LibreNMS v22.1.0 which allows attackers to execute arbitrary javascript code which affected Alerts module (Alert Transport) in Transport name field.

Proof of Concept

Endpoint:

1 POST http://{HOST}/ajax_form.php - Parameter name

~

Payload:

'><body onload=alert("TName")>

~

XSS will fire-up by user visiting:

1 http://{HOST}/alert-transports

~

PoC images:

1 payload

2 XSS-Name field

Impact

This vulnerability is capable of running malicious javascript code on web pages, stealing a user's cookie and gain unauthorized access to that user's account through the stolen cookie.

We are processing your report and will contact the librenms team within 24 hours. a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
PipoCanaja validated this vulnerability a year ago
Faisal Fs ⚔️ has been awarded the disclosure bounty
The fix bounty is now up for grabs
PipoCanaja marked this as fixed in 22.1.0 with commit 135717 a year ago
PipoCanaja has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation