Description:
XSS on the parameters (Replace $DEVICEID with your specific $DEVICEID value):/device/$DEVICE_ID/edit
-> param: display
of Librenms versions 24.9.0, 24.10.0, and 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
1. Add a new device through the LibreNMS interface.
2. Edit the newly created device by going to the "Device Settings" section.
3. In the "Display Name" field, enter the following payload: "><script>alert(1)</script>
.
Additional PoC:
1. In the "Display Name" field, enter the following payload: "><img src onerror="alert(1)">
.
on /device/$DEVICE_ID/ports/arp
path:
on /device/$DEVICE_ID/logs
path:
on /search/search=arp/
path:
Impact:
Execution of Malicious Code
{ "nvd_published_at": "2025-01-16T23:15:08Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-01-16T17:21:20Z" }