Miggo Logo

CVE-2020-15877: Exposure of Resource to Wrong Sphere in LibreNMS

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.41034%
Published
9/8/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
librenms/librenmscomposer< 1.65.11.65.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper access control in route definitions. The commit diff shows a critical change in routes/web.php where authorization middleware was incorrectly implemented using 'guard' => 'admin' instead of the proper 'middleware' => ['can:admin']. In Laravel, 'guard' controls authentication (who you are) while 'middleware'/'can:' controls authorization (what you're allowed to do). This misconfiguration allowed normal users to access admin-only routes through session persistence, as it only checked authentication realm rather than actual permissions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in Li*r*NMS ***or* *.**.*. It **s insu**i*i*nt ****ss *ontrol *or norm*l us*rs ****us* o* "'*u*r*' => '**min'" inst*** o* "'mi**l*w*r*' => ['**n:**min']" in rout*s/w**.p*p.

Reasoning

T** vuln*r**ility st*ms *rom improp*r ****ss *ontrol in rout* ***initions. T** *ommit *i** s*ows * *riti**l ***n** in `rout*s/w**.p*p` w**r* *ut*oriz*tion mi**l*w*r* w*s in*orr**tly impl*m*nt** usin* '*u*r*' => '**min' inst*** o* t** prop*r 'mi**l*w*