LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community']
parameter to html/pages/addhost.inc.php
during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php
command mishandling.
{ "nvd_published_at": "2019-04-24T21:29:00Z", "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2024-04-24T22:10:15Z" }