LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions the login method has no rate limit. An attacker may be able to leverage this vulnerability to gain access to user accounts. This issue has been addressed in version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  Github GHSA | 
                GHSA-rq42-58qf-v3qx | LibreNMS vulnerable to rate limiting bypass on login page | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-29T14:09:05.812Z
Reserved: 2023-10-25T14:30:33.753Z
Link: CVE-2023-46745
Updated: 2024-08-02T20:53:21.168Z
Status : Modified
Published: 2023-11-17T22:15:07.633
Modified: 2024-11-21T08:29:12.850
Link: CVE-2023-46745
No data.
                        OpenCVE Enrichment
                    No data.
 Github GHSA