LibreNMS arbitrary OS commands execution
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Apr 24, 2024
Description
Published by the National Vulnerability Database
Apr 24, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Apr 24, 2024
Last updated
Apr 24, 2024
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the
$_POST['community']
parameter tohtml/pages/addhost.inc.php
during creation of a new device, and then making a/ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php
command mishandling.References