Description
A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context of an admin's account.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f3hw-3h74-wr98 | Cross-site Scripting in librenms/librenms |
References
History
Fri, 25 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2025-04-25T18:59:04.307Z
Reserved: 2022-11-20T00:00:00.000Z
Link: CVE-2022-4068
Updated: 2024-08-03T01:27:54.456Z
Status : Modified
Published: 2022-11-20T05:15:12.183
Modified: 2024-11-21T07:34:32.860
Link: CVE-2022-4068
No data.
OpenCVE Enrichment
No data.
Github GHSA