LibreNMS Information Disclosure
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Mar 6, 2026
Description
Published by the National Vulnerability Database
Sep 9, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jul 17, 2023
Last updated
Mar 6, 2026
An issue was discovered in LibreNMS through 1.47. The scripts that handle graphing options (
html/includes/graphs/common.inc.phpandhtml/includes/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered withmysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via thehtml/graph.phpscript. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, file content, denial of service, or writing arbitrary files.References