Local File Inclusion Vulnerability in LibreNMS by SweetPea
CVE-2019-10666
8.1HIGH
What is CVE-2019-10666?
An issue exists in LibreNMS versions up to 1.47 where dynamic script inclusion via the include() function is improperly handled. This vulnerability arises because user-supplied input is not sanitized before being included, allowing an attacker to execute arbitrary PHP code. Although exploitation is complicated by the requirement for additional text to be appended to the file, an attacker can still control filename and content sufficiently to exploit the system, especially through crafted inputs such as those seen in the path 'csv.php?report=../'.
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved