Description
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1191 | LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability. |
Github GHSA |
GHSA-cwx6-cx7x-4q34 | LibreNMS vulnerable to SQL injection time-based leads to database extraction |
References
History
Thu, 02 Jan 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librenms
Librenms librenms |
|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Librenms
Librenms librenms |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T02:13:39.106Z
Reserved: 2024-04-12T19:41:51.164Z
Link: CVE-2024-32461
Updated: 2024-08-02T02:13:39.106Z
Status : Analyzed
Published: 2024-04-22T22:15:07.840
Modified: 2025-01-02T21:29:53.433
Link: CVE-2024-32461
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA