CVE-2024-32480:
LibreNMS vulnerable to a Time-Based Blind SQL injection leads to database extraction
7.2
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/22/2024
Updated
4/23/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
librenms/librenms | composer | < 24.4.0 | 24.4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the list_devices function's handling of the 'order' parameter. The pre-patch code: 1. Takes user input from $request->get('order') 2. Only checks for presence of 'asc'/'desc' keywords 3. Directly interpolates it into SQL query as 'd.$order
ASC' without proper whitelisting. This allows attackers to inject SQL operators/statements through the order parameter. The patch confirms this by replacing the flawed validation with a regex pattern match that strictly validates column names and sort directions.