{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-50355","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-10-22T17:54:40.958Z","datePublished":"2024-11-15T15:41:48.260Z","dateUpdated":"2024-11-15T16:07:05.229Z"},"containers":{"cna":{"title":"LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q"},{"name":"https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976","tags":["x_refsource_MISC"],"url":"https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976"}],"affected":[{"vendor":"librenms","product":"librenms","versions":[{"version":"< 24.10.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-11-15T15:41:48.260Z"},"descriptions":[{"lang":"en","value":"LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0."}],"source":{"advisory":"GHSA-4m5r-w2rq-q54q","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"librenms","product":"librenms","cpes":["cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"24.10.0","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T16:05:39.086737Z","id":"CVE-2024-50355","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T16:07:05.229Z"}}]}}