Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02MnE3LXFqNmctZ3ZyN84AAgi7
LibreNMS arbitrary OS commands execution
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community']
parameter to html/pages/addhost.inc.php
during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php
command mishandling.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02MnE3LXFqNmctZ3ZyN84AAgi7
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: 24 days ago
CVSS Score: 9.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-62q7-qj6g-gvr7, CVE-2018-20434
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-20434
- https://drive.google.com/file/d/1LcGmOY8x-TG-wnNr-cM_f854kxk0etva/view?usp=sharing
- https://gist.github.com/mhaskar/516df57aafd8c6e3a1d70765075d372d
- https://shells.systems/librenms-v1-46-remote-code-execution-cve-2018-20434
- https://github.com/advisories/GHSA-62q7-qj6g-gvr7
Affected Packages
packagist:librenms/librenms
Dependent packages: 1Dependent repositories: 2
Downloads: 51,096 total
Affected Version Ranges: = 1.46
No known fixed version
All affected versions: