In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.
References
Link | Resource |
---|---|
https://github.com/librenms/librenms/compare/1.65...1.65.1 | Third Party Advisory |
https://community.librenms.org/c/announcements | Release Notes Vendor Advisory |
https://github.com/librenms/librenms/pull/11923 | Patch Third Party Advisory |
https://github.com/librenms/librenms/commit/8f3a29cde5bbd8608f9b42923a7d7e2598bcac4e | Patch Third Party Advisory |
https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-07-21 10:15
Updated : 2020-07-23 07:17
NVD link : CVE-2020-15873
Mitre link : CVE-2020-15873
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
librenms
- librenms