
We found results for “”
CVE-2024-47527
Good to know:

Date: October 1, 2024
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Device Dependencies" feature allows authenticated users to inject arbitrary JavaScript through the device name ("hostname" parameter). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0.
Language: PHP
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Top Fix

Upgrade Version
Upgrade to version librenms/librenms - dev-dependabot/composer/laravel/framework-10.48.23;librenms/librenms - dev-dependabot/npm_and_yarn/elliptic-6.6.0;librenms/librenms - 24.9.0;librenms/librenms - dev-php81;librenms/librenms - dev-dependabot/composer/tecnickcom/tcpdf-6.8.0;librenms/librenms - dev-Fix-for-Aruba-switches-alerting-on-Stack-Topology;librenms/librenms - dev-docs-edit-link;librenms/librenms - dev-laf-patch-2;librenms/librenms - dev-dependabot/composer/nesbot/carbon-2.72.6;librenms/librenms - dev-cisco_trans;librenms/librenms - dev-dependabot/composer/league/commonmark-2.6.0;librenms/librenms - dev-dependabot/composer/symfony/http-client-6.4.14;librenms/librenms - dev-revert-16731-sensor_graphs;librenms/librenms - no_fix;librenms/librenms - dev-huawei-vrp-vlan-quirks;librenms/librenms - dev-dependabot/npm_and_yarn/nanoid-3.3.8;librenms/librenms - dev-translation-update;librenms/librenms - dev-vlan-discovery-only;librenms/librenms - dev-laf-patch-1;librenms/librenms - dev-revert-16462-truenas-scale-(new-os);librenms/librenms - dev-dependabot/npm_and_yarn/vue-3.0.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | HIGH |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | LOW |
Availability (A): | LOW |