CVE-2019-10669

HIGH

Librenms < 1.47 - OS Command Injection

Title source: rule

Description

An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru().

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/47375
metasploit WORKING POC EXCELLENT
by Eldar Marcussen, Shelby Pace · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/librenms_collectd_cmd_inject.rb

Scores

CVSS v3 7.2
EPSS 0.5568
EPSS Percentile 98.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
librenms/librenms < 1.47
Published Sep 09, 2019
Tracked Since Feb 18, 2026