- Description
- LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authenticated users to inject arbitrary JavaScript through the "name" parameter when creating a new Port Group. This vulnerability results in the execution of malicious code when the "Port Settings" page is visited after the affected Port Group is added to a device, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- security-advisories@github.com
- CWE-79
- Hype score
- Not currently trending
🚨 LibreNMS Users Beware: Critical XSS Vulnerability Exploitable (#CVE-2024-50350) https://t.co/dCWqi0VEcx
@UndercodeNews
20 Nov 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-50350 Stored XSS Vulnerability in LibreNMS "Port Settings" Fixed in 24.10.0 LibreNMS is a network monitoring tool made with PHP, MySQL, and SNMP. It has a Stored Cross-Site Scripting (XSS) vulnerability ... https://t.co/49YHDyd4IL
@VulmonFeeds
15 Nov 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-50350 LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the "Port Settings" page allows authe… https://t.co/tlMirs0awj
@CVEnew
15 Nov 2024
150 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B4BD88D2-5DA7-450B-AEFA-33BCA61685A7",
"versionEndExcluding": "24.10.0"
}
],
"operator": "OR"
}
]
}
]