First published: Tue Oct 01 2024(Updated: )
### Summary Stored Cross-Site Scripting (XSS) can archive via Uploading a new Background for a Custom Map. ### Details Users with "admin" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger onload. This led to Stored Cross-Site Scripting (XSS). ### PoC 1. Login using an Admin role account. 2. Go over to "$URL/maps/custom", the Manage Custom Maps.  3. Create a new map then choose to edit it. 4. Choose the "Set Background" option.  5. Choose to upload a SVG file that have this content. ```svg <svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"> <circle cx="50" cy="50" r="40" /> </svg> ``` 6. Once uploaded, there should be a link to the SVG return in the POST request to the API "$URL/maps/custom/1/background".  7. Go over to that link on browser, should see a pop-up.  ### Impact Attacker can use this to perform malicious java script code for malicious intent. This would impact other Admin role users and the Global Read role users. Normal users does not have permission to read the file, so they are not affected.
Affected Software | Affected Version | How to fix |
---|---|---|
composer/librenms/librenms | <24.9.0 | 24.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability GHSA-x8gm-j36p-fppf is classified as a Stored Cross-Site Scripting (XSS) vulnerability.
To fix GHSA-x8gm-j36p-fppf, users should upgrade to a secure version of librenms/librenms higher than 24.9.0.
Users with the 'admin' role in librenms/librenms are affected by GHSA-x8gm-j36p-fppf due to their ability to upload SVG files.
GHSA-x8gm-j36p-fppf enables attackers to conduct Stored Cross-Site Scripting attacks through malicious SVG file uploads.
The consequences of GHSA-x8gm-j36p-fppf include potential unauthorized script execution in the context of the user's session, compromising user data.