Miggo Logo

CVE-2024-32461: LibreNMS vulnerable to SQL injection time-based leads to database extraction

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.29781%
Published
4/22/2024
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
librenms/librenmscomposer< 24.4.024.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from inline SQL query construction in packages.inc.php where user-controlled $_POST['package'] was directly interpolated into a SQL query string (line 83 in original code). The patch replaced this with parameterized queries (? placeholder) and added proper input handling. While no named function is explicitly mentioned, the SQL query construction logic in this file is the vulnerable component. The confidence is high as the commit diff clearly shows unsafe string interpolation being replaced with proper parameter binding.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry SQL inj**tion vuln*r**ility in POST /s**r**/s**r**=p**k***s in Li*r*NMS **.*.* *llows * us*r wit* *lo**l r*** privil***s to *x**ut* SQL *omm*n*s vi* t** p**k*** p*r*m*t*r. ### **t*ils T**r* is * l**k o* *y*i*n* o* **t* *omin* *rom t** u

Reasoning

T** vuln*r**ility st*ms *rom inlin* SQL qu*ry *onstru*tion in p**k***s.in*.p*p w**r* us*r-*ontroll** $_POST['p**k***'] w*s *ir**tly int*rpol*t** into * SQL qu*ry strin* (lin* ** in ori*in*l *o**). T** p*t** r*pl**** t*is wit* p*r*m*t*riz** qu*ri*s (?