First published: Fri Nov 17 2023(Updated: )
### Summary Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that. ### PoC Go to /?username=admin&password=password&submit= Capture request in Burpsuite intruder and add payload marker at password parameter value. Start the attack after adding your password list We have added 74 passwords Check screenshot for more info <img width="1241" alt="Screenshot 2023-11-06 at 8 55 19 PM" src="https://user-images.githubusercontent.com/31764504/280905148-42274f1e-f869-4145-95b4-71c0bffde3a0.png"> ### Impact An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
composer/librenms/librenms | <23.11.0 | 23.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is GHSA-rq42-58qf-v3qx.
The severity of GHSA-rq42-58qf-v3qx is medium with a CVSS score of 5.3.
The affected software for GHSA-rq42-58qf-v3qx is librenms/librenms with version 23.11.0.
To fix GHSA-rq42-58qf-v3qx, update the affected software package librenms/librenms to version 23.11.0 or higher.
There is no Common Vulnerabilities and Exposures (CVE) ID associated with GHSA-rq42-58qf-v3qx.