LibreNMS vulnerable to rate limiting bypass on login page
Moderate severity
GitHub Reviewed
Published
Nov 17, 2023
in
librenms/librenms
•
Updated Nov 20, 2023
Description
Published to the GitHub Advisory Database
Nov 17, 2023
Reviewed
Nov 17, 2023
Published by the National Vulnerability Database
Nov 17, 2023
Last updated
Nov 20, 2023
Summary
Application is using two login methods and one of them is using GET request for authentication. There is no rate limiting security feature at GET request or backend is not validating that.
PoC
Go to /?username=admin&password=password&submit=
Capture request in Burpsuite intruder and add payload marker at password parameter value.
Start the attack after adding your password list
We have added 74 passwords
Check screenshot for more info
Impact
An attacker can Bruteforce user accounts and using GET request for authentication is not recommended because certain web servers logs all requests in old logs which can also store victim user credentials.
References