An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2019-0701 | An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter. | 
  Github GHSA | 
                GHSA-g9xh-3w5g-229r | SQL Injection in LibreNMS | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:32:00.839Z
Reserved: 2019-03-31T00:00:00
Link: CVE-2019-10671
No data.
Status : Modified
Published: 2019-09-09T14:15:11.740
Modified: 2024-11-21T04:19:43.510
Link: CVE-2019-10671
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA