icon

We found results for “

CVE-2024-47523

Good to know:

icon

Date: October 1, 2024

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Transports" feature allows authenticated users to inject arbitrary JavaScript through the "Details" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

Top Fix

icon

Upgrade Version

Upgrade to version librenms/librenms - dev-cisco_trans;librenms/librenms - dev-huawei-vrp-vlan-quirks;librenms/librenms - dev-dependabot/composer/nesbot/carbon-2.72.6;librenms/librenms - dev-dependabot/npm_and_yarn/elliptic-6.6.0;librenms/librenms - no_fix;librenms/librenms - dev-dependabot/npm_and_yarn/vue-3.0.0;librenms/librenms - dev-vlan-discovery-only;librenms/librenms - dev-docs-edit-link;librenms/librenms - dev-dependabot/npm_and_yarn/nanoid-3.3.8;librenms/librenms - dev-revert-16462-truenas-scale-(new-os);librenms/librenms - dev-translation-update;librenms/librenms - dev-dependabot/composer/league/commonmark-2.6.0;librenms/librenms - dev-laf-patch-2;librenms/librenms - dev-Fix-for-Aruba-switches-alerting-on-Stack-Topology;librenms/librenms - dev-php81;librenms/librenms - dev-laf-patch-1;librenms/librenms - dev-dependabot/composer/tecnickcom/tcpdf-6.8.0;librenms/librenms - dev-dependabot/composer/laravel/framework-10.48.23;librenms/librenms - dev-dependabot/composer/symfony/http-client-6.4.14;librenms/librenms - 24.9.0;librenms/librenms - dev-revert-16731-sensor_graphs

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us