Description:
XSS on the parameters (Replace $DEVICEID with your specific $DEVICEID value):/device/$DEVICE_ID/edit -> param: display
of Librenms versions 24.11.0 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
1. Add a new device through the LibreNMS interface.
2. Edit the newly created device by going to the "Device Settings" section.
3. In the "Display Name" field, enter the following payload: "><img src onerror="alert(document.cookie)">.
4. Save the changes.
5. The XSS payload is triggered when navigating to the path /device/$DEVICE_ID/logs and hovering over a type containing a tag (such as Core 1 in the image).
Impact:
Execution of Malicious Code
{
"severity": "MODERATE",
"nvd_published_at": "2025-01-16T23:15:07Z",
"github_reviewed": true,
"github_reviewed_at": "2025-01-16T17:18:32Z",
"cwe_ids": [
"CWE-79"
]
}