LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Services" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the "descr" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Nov 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:librenms:librenms:24.10.0:*:*:*:*:*:*:* |
Fri, 15 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Librenms
Librenms librenms |
|
CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* | |
Vendors & Products |
Librenms
Librenms librenms |
|
Metrics |
ssvc
|
Fri, 15 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Services" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the "descr" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0. | |
Title | LibreNMS has a Stored XSS ('Cross-site Scripting') in librenms/includes/html/pages/device/services.inc.php | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-15T16:39:15.274Z
Reserved: 2024-11-11T18:49:23.561Z
Link: CVE-2024-52526

Updated: 2024-11-15T16:39:10.500Z

Status : Analyzed
Published: 2024-11-15T16:15:38.107
Modified: 2024-11-20T14:39:19.647
Link: CVE-2024-52526

No data.