Back to list

LibreNMS has an Authenticated OS Command Injection — CVE-2024-51092

GitHub · GitHub · CVE-2024-51092

ID
CVE-2024-51092
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
critical
CVSS
9.1
EPSS
0.73306

Summary

### Summary An authenticated attacker can create dangerous directory names on the system and alter sensitive configuration parameters through the web portal. Those two defects combined then allows to inject arbitrary OS commands inside `shell_exec()` calls, thus achieving arbitrary code execution. ### Details #### OS Command Injection We start by inspecting the file `app/Http/Controllers/AboutController.php`, more…

Product

composer: librenms/librenms

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories