Improper Access Control Affecting librenms/librenms package, versions >=0.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-LIBRENMSLIBRENMS-2401227
  • published15 Feb 2022
  • disclosed15 Feb 2022
  • creditFaisal Fs

Introduced: 15 Feb 2022

CVE-2022-0580  (opens in a new tab)
CWE-284  (opens in a new tab)
First added by Snyk

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

librenms/librenms is a fully featured network monitoring system that provides a wealth of features and device support.

Affected versions of this package are vulnerable to Improper Access Control. The port-groups functionality fails to enforce policy such that normal users could act outside of their intended permissions which are supposedly accessible by the Administrator only. This vulnerability allows attackers with normal role/level privileges to interact with port-groups functionalities such as create, edit/modify and delete.

Note:

Affected endpoints:

  1. GET http://{HOST}/port-groups - [view all port groups]

  2. POST http://{HOST}/port-groups - [create]

  3. POST http://{HOST}/port-groups/{port_id} - [edit]

  4. DELETE http://{HOST}/port-groups/{port_id} - [delete]

CVSS Scores

version 3.1