Command Injection Affecting librenms/librenms package, versions <1.50.1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-LIBRENMSLIBRENMS-466431
- published 9 Sep 2019
- disclosed 9 Sep 2019
- credit Eldar Marcussen
Introduced: 9 Sep 2019
CVE-2019-10669 Open this link in a new tabHow to fix?
Upgrade librenms/librenms
to version 1.50.1 or higher.
Overview
librenms/librenms is a fully featured network monitoring system that provides a wealth of features and device support.
Affected versions of this package are vulnerable to Command Injection. It is possible to inject arbitrary commands in html/includes/graphs/device/collectd.inc.php
where user supplied parameters are filtered with the mysqli_escape_real_string function
. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as backticks, allowing an attacker to inject commands into the variable $rrd_cmd
, which gets executed via passthru()
.