Skip to content

tCu0n9/Stored-XSS-LibreNMS-Display-Name

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

Stored-XSS-LibreNMS-Display-Name

Description:

XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):/device/$DEVICE_ID/edit -> param: display

of Librenms versions 24.9.0 and 24.10.0 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

Proof of Concept:

  1. Add a new device through the LibreNMS interface.

  2. Edit the newly created device by going to the "Device Settings" section.

  3. In the "Display Name" field, enter the following payload: "><script>alert(1)</script>. Screenshot from 2024-11-06 09-41-37

  4. Save the changes.

  5. The XSS payload triggers when navigating to either the "Alert Rules" or "Custom OID" sections within the "Edit" tab for the device. Additionally, if an application was previously added, the payload will also execute when accessing the "/apps" path.

  • on "Alert Rules" section: Screenshot from 2024-11-06 09-41-43

  • on "Custom OID" section: Screenshot from 2024-11-06 09-41-52

  • on the "/apps" path: Screenshot from 2024-11-06 09-42-05

Additional PoC:

  1. In the "Display Name" field, enter the following payload: "><img src onerror="alert(1)">. 386126249-addb1b00-23b1-4c26-8ac7-494cb24ebe8a

  2. The XSS vulnerability is triggered when accessing the "/ports" path, and the payload executes when hovering over the modified value in the "Port" field. 386126777-446e0d62-2016-4435-a1eb-fe85079498e4

Impact:

Execution of Malicious Code

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published