cve/2023/CVE-2023-48294.md

18 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-48294](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48294)
![](https://img.shields.io/static/v1?label=Product&message=librenms&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%2023.11.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions of LibreNMS when a user accesses their device dashboard, one request is sent to `graph.php` to access graphs generated on the particular Device. This request can be accessed by a low privilege user and they can enumerate devices on librenms with their id or hostname. Leveraging this vulnerability a low privilege user can see all devices registered by admin users. This vulnerability has been addressed in commit `489978a923` which has been included in release version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4
#### Github
No PoCs found on GitHub currently.