Current Description
An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring.
Source:
MITRE
View Analysis Description
Analysis Description
An issue was discovered in LibreNMS through 1.47. Several of the scripts perform dynamic script inclusion via the include() function on user supplied input without sanitizing the values by calling basename() or a similar function. An attacker can leverage this to execute PHP code from the included file. Exploitation of these scripts is made difficult by additional text being appended (typically .inc.php), which means an attacker would need to be able to control both a filename and its content on the server. However, exploitation can be achieved as demonstrated by the csv.php?report=../ substring.
Source:
MITRE
Severity
CVSS 3.x Severity and Metrics:
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0 Severity and Metrics:
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Weakness Enumeration
CWE-ID |
CWE Name |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') |
NIST
|
Change History
1 change record found
- show changes
Initial Analysis -
9/10/2019 12:05:16 PM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* versions up to (including) 1.47 |
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P) |
Added |
CVSS V3.1 |
|
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Added |
CWE |
|
CWE-94 |
Changed |
Reference Type |
https://www.darkmatter.ae/xen1thlabs/librenms-limited-local-file-inclusion-via-directory-traversal-vulnerability-xl-19-020/ No Types Assigned |
https://www.darkmatter.ae/xen1thlabs/librenms-limited-local-file-inclusion-via-directory-traversal-vulnerability-xl-19-020/ Exploit, Third Party Advisory |