vendor:
LibreNMS
by:
Punt
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: LibreNMS
Affected Version From: 1.46 and less
Affected Version To: 1.46 and less
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux and Windows
2019
LibreNMS 1.46 – ‘search’ SQL Injection
Vulnerable script /html/ajax_serarch.php contains a search parameter $search = mres($_REQUEST['search']); which accepts a user input using $_REQUEST['']. The mres() fuction is located under /includes/common.php and calls the mysqli_real_escape_string() which can be bypassed by '%'. The POC involves logging into LibreNMS and going to /ajax_search.php?search=%27&type=group or /ajax_search.php?search=%27&type=alert-rules which will result in an SQL syntax error.
Mitigation:
The Librenms team have applied a patch.