Overview
- Description
- LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authenticated users to inject arbitrary JavaScript through the "name" parameter when creating a new Port Group. This vulnerability results in the execution of malicious code when the "Port Settings" page is visited after the affected Port Group is added to a device, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.
- Source
- security-advisories@github.com
- NVD status
- Received
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 4.8
- Impact score
- 2.7
- Exploitability score
- 1.7
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security-advisories@github.com
- CWE-79
Social media
- Hype score
- Not currently trending
CVE-2024-50350 Stored XSS Vulnerability in LibreNMS "Port Settings" Fixed in 24.10.0 LibreNMS is a network monitoring tool made with PHP, MySQL, and SNMP. It has a Stored Cross-Site Scripting (XSS) vulnerability ... https://t.co/49YHDyd4IL
@VulmonFeeds
15 Nov 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-50350 LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authe… https://t.co/tlMirs0awj
@CVEnew
15 Nov 2024
150 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes