LibreNMS has a stored XSS in ExamplePlugin with Device's Notes
Moderate severity
GitHub Reviewed
Published
Nov 15, 2024
in
librenms/librenms
•
Updated Nov 15, 2024
Description
Published to the GitHub Advisory Database
Nov 15, 2024
Reviewed
Nov 15, 2024
Published by the National Vulnerability Database
Nov 15, 2024
Last updated
Nov 15, 2024
Summary
The application fail to sanitising inputs properly and rendering the code from user input to browser which allow an attacker to execute malicious javascript code.
Details
User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger.
PoC
<img src="x" onerror="alert(document.cookie)">
into the device NotesImpact
It could allow authenticated users to execute arbitrary JavaScript code in the context of other users' sessions.
Impacted users could have their accounts compromised, enabling the attacker to perform unauthorized actions on their behalf.
References