CVE-2018-20434
CRITICALLibrenms - OS Command Injection
Title source: ruleDescription
LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Askar · pythonwebappsphp
https://www.exploit-db.com/exploits/47044
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/46970
metasploit
WORKING POC
EXCELLENT
by mhaskar, Shelby Pace · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
References (5)
Scores
CVSS v3
9.8
EPSS
0.6633
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (2)
librenms/librenms
1.46
librenms/librenms
Packagist
Published
Apr 24, 2019
Tracked Since
Feb 18, 2026