Skip to main content

CVE-2022-4068: CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes in librenms librenms/librenms

Medium
Published: Sun Nov 20 2022 (11/20/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: librenms
Product: librenms/librenms

Description

A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context of an admin's account.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:19:14 UTC

Technical Analysis

CVE-2022-4068 is a medium-severity vulnerability affecting the LibreNMS network monitoring platform. The core issue involves improper control over dynamically-determined object attributes (CWE-915), which manifests in two related security flaws. First, a user who has been disabled by an administrator can re-enable their own account if they maintain an active session, effectively bypassing administrative restrictions. This indicates a failure in session state validation and account status enforcement. Second, the vulnerability includes insufficient sanitization of usernames in the admin user overview interface, leading to a cross-site scripting (XSS) attack vector. An attacker with low privileges can inject arbitrary JavaScript code that executes in the context of an administrator's browser session. This XSS flaw enables privilege escalation through session hijacking, unauthorized actions, or theft of sensitive information accessible to the admin account. The combination of these issues allows a low-privilege user to regain access after being disabled and potentially compromise administrative control via script injection. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to the integrity and confidentiality of the LibreNMS environment. The affected versions are unspecified, suggesting that users should assume all current versions prior to patching are vulnerable. The lack of a patch link indicates that remediation may require manual mitigation or awaiting an official update from the LibreNMS project. Overall, this vulnerability undermines access control mechanisms and input validation, two fundamental security principles, within a critical network monitoring tool used to oversee IT infrastructure.

Potential Impact

For European organizations relying on LibreNMS for network monitoring and management, this vulnerability could have serious operational and security consequences. Unauthorized re-enablement of disabled accounts compromises administrative control, potentially allowing malicious insiders or compromised users to regain access after being revoked. The XSS vulnerability can lead to session hijacking of privileged administrators, enabling attackers to execute arbitrary commands, alter monitoring configurations, or disable alerts. This could result in undetected network outages, data exfiltration, or manipulation of monitoring data, undermining trust in network visibility and incident response capabilities. Given the central role of LibreNMS in infrastructure monitoring, exploitation could disrupt critical services, especially in sectors like telecommunications, finance, energy, and government where network uptime and security are paramount. The confidentiality of sensitive network topology and device information could also be at risk, impacting compliance with European data protection regulations such as GDPR. Although no active exploits are currently known, the ease of exploitation via XSS and session persistence makes this a credible threat that European organizations must address proactively.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit active sessions and forcibly log out all users to invalidate any sessions held by disabled accounts. 2) Restrict administrative interface access to trusted IP ranges and enforce multi-factor authentication (MFA) for admin accounts to reduce the risk of session hijacking. 3) Apply strict input validation and output encoding on all user-supplied data fields, particularly usernames displayed in the admin overview, to prevent XSS injection. 4) Monitor logs for unusual account reactivation or privilege escalation activities. 5) If an official patch is not yet available, consider deploying a web application firewall (WAF) with custom rules to block suspicious script payloads targeting the admin interface. 6) Educate administrators on the risks of session persistence and encourage regular session invalidation policies. 7) Engage with the LibreNMS community or vendor to obtain timely patches and updates. These targeted actions go beyond generic advice by focusing on session management hygiene, input sanitization, and access control hardening specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-11-20T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbeff41

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:19:14 PM

Last updated: 7/30/2025, 5:42:25 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats