First published: Fri Nov 17 2023(Updated: )
### Summary XSS attacks occurs when application is not sanitising inputs properly and rendering the code from user input to browser which could allow an attacker to execute malicious javascript code. ### PoC 1. Login 2. Create a device group in /device-groups 3. Name it as `"><img src=x onerror=alert(1);>` 4. save it 5. Go to services and create a service template and add that device group into that and save it 6. After that go back to device groups and delete that device, you will see XSS payload popup in message <img width="1043" alt="Screenshot 2023-11-08 at 9 15 56 PM" src="https://user-images.githubusercontent.com/31764504/281489434-9beaebd6-b9ce-4098-a8e0-d67b185062b5.png"> ### Vulnerable code: https://github.com/librenms/librenms/blob/63eeeb71722237d1461a37bb6da99fda25e02c91/app/Http/Controllers/DeviceGroupController.php#L173C21-L173C21 Line 173 is not sanitizing device name properly <img width="793" alt="Screenshot 2023-11-08 at 9 26 14 PM" src="https://user-images.githubusercontent.com/31764504/281490570-5ae6e73a-37ce-4683-8bc8-81655abd8d09.png"> ### Impact Cross site scripting can lead to cookie stealing attacks
Affected Software | Affected Version | How to fix |
---|---|---|
composer/librenms/librenms | <23.11.0 | 23.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this XSS attack is GHSA-8phr-637g-pxrg.
XSS attacks occur when an application does not properly sanitize inputs and allows an attacker to execute malicious JavaScript code.
In this vulnerability, an XSS attack occurs when the application fails to sanitize user input and renders it in the browser.
The severity level of this vulnerability is medium with a CVSS score of 6.3.
To fix this vulnerability, update your Librenms package to version 23.11.0 or above.