Skip to content

Commit 4192977

Browse files
1 parent 39de231 commit 4192977

1 file changed

Lines changed: 4 additions & 8 deletions

File tree

advisories/github-reviewed/2022/05/GHSA-q5rg-wg7h-73m5/GHSA-q5rg-wg7h-73m5.json

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q5rg-wg7h-73m5",
4-
"modified": "2023-07-17T23:09:56Z",
4+
"modified": "2026-03-06T15:10:27Z",
55
"published": "2022-05-24T16:55:40Z",
66
"aliases": [
77
"CVE-2019-10665"
88
],
99
"summary": "LibreNMS Information Disclosure",
10-
"details": "An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (`html/includes/graphs/common.inc.php` and `html/includes/graphs/graphs.inc.php`) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with `mysqli_real_escape_string`, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the `html/graph.php` script. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.",
10+
"details": "An issue was discovered in LibreNMS through 1.47. The scripts that handle graphing options (`html/includes/graphs/common.inc.php` and `html/includes/graphs/graphs.inc.php`) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with `mysqli_real_escape_string`, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the `html/graph.php` script. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -41,12 +41,8 @@
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10665"
4242
},
4343
{
44-
"type": "WEB",
45-
"url": "https://github.com/spaceraccoon/CVE-2020-10665"
46-
},
47-
{
48-
"type": "WEB",
49-
"url": "https://www.activecyber.us/activelabs/docker-desktop-local-privilege-escalation-cve-2020-10665"
44+
"type": "PACKAGE",
45+
"url": "https://github.com/librenms/librenms"
5046
},
5147
{
5248
"type": "WEB",

0 commit comments

Comments
 (0)