LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2024-1233 | LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue. | 
  Github GHSA | 
                GHSA-jh57-j3vq-h438 | LibreNMS vulnerable to a Time-Based Blind SQL injection leads to database extraction | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 02 Jan 2025 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Librenms
         Librenms librenms  | 
|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Librenms
         Librenms librenms  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T02:13:39.173Z
Reserved: 2024-04-12T19:41:51.168Z
Link: CVE-2024-32480
Updated: 2024-08-02T02:13:39.173Z
Status : Analyzed
Published: 2024-04-22T23:15:50.440
Modified: 2025-01-02T21:38:11.383
Link: CVE-2024-32480
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA