Permalink
CVE-2020-36947
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection
LibreNMS 1.46 contains an authenticated SQL injection vulnerability in the MAC accounting graph endpoint that allows remote attackers to extract database information. Attackers can exploit the vulnerability by manipulating the 'sort' parameter with crafted SQL injection techniques to retrieve sensitive database contents through time-based blind SQL injection.
References
- ExploitDB-49246 exploit
- LibreNMS Official Website product
- LibreNMS GitHub Repository product
- LibreNMS Community product
- VulnCheck Advisory: LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection third-party-advisory
- https://community.librenms.org/ exploit
- ExploitDB-49246 exploit
- LibreNMS Official Website product
- LibreNMS GitHub Repository product
- LibreNMS Community product
- VulnCheck Advisory: LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection third-party-advisory
- https://community.librenms.org/ exploit
- ExploitDB-49246 exploit
- LibreNMS Official Website product
- LibreNMS GitHub Repository product
- LibreNMS Community product
- VulnCheck Advisory: LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection third-party-advisory
- https://community.librenms.org/ exploit
Affected products
LibreNMS
- ==1.46
Package maintainers
-
@vidister Fiona Weber <v@vidister.de>
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@yuyuyureka Yureka <yuka@yuka.dev>
-
@n0emis Ember Keske <nixpkgs@n0emis.network>
-
@johannwagner Johann Wagner <nix@wagner.digital>