First published: Mon Apr 22 2024(Updated: )
### Summary SQL injection vulnerability in POST /search/search=packages in LibreNMS 24.3.0 allows a user with global read privileges to execute SQL commands via the package parameter. ### Details There is a lack of hygiene of data coming from the user in line 83 of the file librenms/includes/html/pages/search/packages.inc.php  ### PoC https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6 ### Impact With this vulnerability, we can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/librenms/librenms | <24.4.0 | 24.4.0 |
LibreNMS | <24.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32461 has been classified as a high severity vulnerability due to its potential impact on database security.
To fix CVE-2024-32461, upgrade LibreNMS to version 24.4.0 or later.
Any user of LibreNMS version 24.3.0 with global read privileges is affected by CVE-2024-32461.
CVE-2024-32461 is an SQL injection vulnerability that allows execution of arbitrary SQL commands.
Exploiting CVE-2024-32461 could allow an attacker to manipulate the database, potentially leading to data breaches.