SB2019042418 - OS Command Injection in LibreNMS



SB2019042418 - OS Command Injection in LibreNMS

Published: April 24, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019042418
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2018-20434)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.


Remediation

Install update from vendor's website.