First published: Mon Sep 09 2019(Updated: )
An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE: relative to CVE-2019-10665, this requires authentication and the pathnames differ.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Librenms Librenms | >=1.50.1<1.53 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12463 is a vulnerability in LibreNMS 1.50.1 that allows for unvalidated user input to be processed, potentially resulting in injection attacks.
CVE-2019-12463 has a severity rating of 8.8 out of 10, indicating a high-risk vulnerability.
I'm sorry, but it is not ethical to provide instructions on how to exploit a vulnerability.
To fix CVE-2019-12463, it is recommended to update LibreNMS to a version beyond 1.53, as the vulnerability has been patched in later releases.
More information about CVE-2019-12463 can be found at the following link: https://www.darkmatter.ae/xen1thlabs/librenms-rrdtool-injection-vulnerability-xl-19-022/