In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://research.loginsoft.com/bugs/blind-sql-injection-in-librenms/ | third party advisory exploit |
https://community.librenms.org/c/announcements | release notes vendor advisory |
https://github.com/librenms/librenms/compare/1.65...1.65.1 | third party advisory |
https://github.com/librenms/librenms/pull/11923 | third party advisory patch |
https://github.com/librenms/librenms/commit/8f3a29cde5bbd8608f9b42923a7d7e2598bcac4e | third party advisory patch |