Exposure of Sensitive Information to an Unauthorized Actor in librenms/librenms


Reported on

Feb 13th 2022

LibreNMS v22.1.0 allows users with the normal role/level to view/access the alert transport details. The alert transport may expose sensitive information to an actor that is not explicitly authorized to have access to that information which are supposedly accessible by the Administrator only.

Proof of Concept

Affected endpoints:

1 GET http://{HOST}/alert-transports


Steps to reproduce:

1 Login as normal user.

2 Browse to http://{HOST}/alert-transports

3 We can view/access the alert transport information in details such as Transport Name, host IP, Transport Type, Personal Access Token, API Token etc.


PoC image:


This vulnerability is capable of leading to unauthorized sensitive information disclosure of relevant parties.

We are processing your report and will contact the librenms team within 24 hours. a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
Faisal Fs ⚔️ modified the report
a year ago
We have contacted a member of the librenms team and are waiting to hear back a year ago
PipoCanaja validated this vulnerability a year ago
Faisal Fs ⚔️ has been awarded the disclosure bounty
The fix bounty is now up for grabs
Neil Lathwood marked this as fixed in 22.2.0 with commit 95970a a year ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation