CVE-2018-20434

CRITICAL

Librenms - OS Command Injection

Title source: rule

Description

LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Askar · pythonwebappsphp
https://www.exploit-db.com/exploits/47044
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/46970
nomisec WORKING POC 9 stars
by mhaskar · poc
https://github.com/mhaskar/CVE-2018-20434
metasploit WORKING POC EXCELLENT
by mhaskar, Shelby Pace · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/librenms_addhost_cmd_inject.rb

Scores

CVSS v3 9.8
EPSS 0.6633
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (2)
librenms/librenms 1.46
librenms/librenms Packagist
Published Apr 24, 2019
Tracked Since Feb 18, 2026