First published: Thu Jan 16 2025(Updated: )
# StoredXSS-LibreNMS-Display Name 2 **Description:** XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display of Librenms versions 24.11.0 ([https://github.com/librenms/librenms](https://github.com/librenms/librenms)) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. **Proof of Concept:** 1. Add a new device through the LibreNMS interface. 2. Edit the newly created device by going to the "Device Settings" section. 3. In the "Display Name" field, enter the following payload: `"><img src onerror="alert(document.cookie)">`.  4. Save the changes. 5. The XSS payload is triggered when navigating to the path /device/$DEVICE_ID/logs and hovering over a type containing a tag (such as Core 1 in the image).  **Impact:** Execution of Malicious Code
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/librenms/librenms | =24.11.10 | 24.12.0 |
LibreNMS | <24.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56144 is classified as medium, as it allows for stored cross-site scripting vulnerabilities.
To fix CVE-2024-56144, upgrade LibreNMS to version 24.12.0 or later.
LibreNMS versions 24.11.0 to 24.11.10 are affected by CVE-2024-56144.
CVE-2024-56144 is a stored cross-site scripting (XSS) vulnerability.
CVE-2024-56144 occurs when editing the display name parameter for a device at the URL /device/$DEVICE_ID/edit.