Summary
Detail | |||
---|---|---|---|
Vendor | Phpipam | First view | 2022-01-19 |
Product | Phpipam | Last view | 2025-03-31 |
Version | 1.4.4 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:phpipam:phpipam |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.7 | 2025-03-31 | CVE-2024-55093 | phpIPAM through 1.7.3 has a reflected Cross-Site Scripting (XSS) vulnerability in the install scripts. |
6.1 | 2025-03-20 | CVE-2024-10727 | A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user. |
5.4 | 2025-03-20 | CVE-2024-10725 | A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which are then executed in the context of other users who view the affected pages. The issue occurs when editing the NAT destination address, where user input is not properly sanitized. This can lead to data theft, account compromise, and other malicious activities. The vulnerability is fixed in version 1.7.0. |
5.4 | 2025-03-20 | CVE-2024-10724 | A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2, specifically in the Subnet NAT translations section when editing the Destination address. This vulnerability allows an attacker to execute malicious code. The issue is fixed in version 1.7.0. |
5.4 | 2025-03-20 | CVE-2024-10723 | A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0. |
5.4 | 2025-03-20 | CVE-2024-10722 | A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability allows attackers to inject malicious scripts into the 'Description' field of custom fields in the 'IP RELATED MANAGEMENT' section. This can lead to data theft, account compromise, distribution of malware, website defacement, content manipulation, and phishing attacks. The issue is fixed in version 1.7.0. |
6.1 | 2025-03-20 | CVE-2024-10720 | A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability occurs in the 'Device Management' section under 'Administration' where an attacker can inject malicious scripts into the 'Name' and 'Description' fields when adding a new device type. This can lead to data theft, account compromise, distribution of malware, website defacement, and phishing attacks. The issue is fixed in version 1.7.0. |
5.4 | 2025-03-20 | CVE-2024-10719 | A stored cross-site scripting (XSS) vulnerability exists in phpipam version 1.5.2, specifically in the circuits options functionality. This vulnerability allows an attacker to inject malicious scripts via the 'option' parameter in the POST request to /phpipam/app/admin/circuits/edit-options-submit.php. The injected script can be executed in the context of the user's browser, leading to potential cookie theft and end-user file disclosure. The issue is fixed in version 1.7.0. |
7.5 | 2025-03-20 | CVE-2024-10718 | In phpipam/phpipam version 1.5.1, the Secure attribute for sensitive cookies in HTTPS sessions is not set. This could cause the user agent to send those cookies in plaintext over an HTTP session, potentially exposing sensitive information. The issue is fixed in version 1.7.0. |
5.9 | 2024-11-15 | CVE-2024-0787 | phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0. |
4.8 | 2024-11-15 | CVE-2022-1226 | A Cross-Site Scripting (XSS) vulnerability in phpipam/phpipam versions prior to 1.4.7 allows attackers to execute arbitrary JavaScript code in the browser of a victim. This vulnerability affects the import Data set feature via a spreadsheet file upload. The affected endpoints include import-vlan-preview.php, import-subnets-preview.php, import-vrf-preview.php, import-ipaddr-preview.php, import-devtype-preview.php, import-devices-preview.php, and import-l2dom-preview.php. The vulnerability can be exploited by uploading a specially crafted spreadsheet file containing malicious JavaScript payloads, which are then executed in the context of the victim's browser. This can lead to defacement of websites, execution of malicious JavaScript code, stealing of user cookies, and unauthorized access to user accounts. |
7.5 | 2023-10-02 | CVE-2023-41580 | Phpipam before v1.5.2 was discovered to contain a LDAP injection vulnerability via the dname parameter at /users/ad-search-result.php. This vulnerability allows attackers to enumerate arbitrary fields in the LDAP server and access sensitive data via a crafted POST request. |
4.8 | 2023-03-07 | CVE-2023-1212 | Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2. |
7.2 | 2023-03-07 | CVE-2023-1211 | SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2. |
5.3 | 2023-02-04 | CVE-2023-0678 | Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1. |
6.1 | 2023-02-04 | CVE-2023-0677 | Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1. |
6.1 | 2023-02-04 | CVE-2023-0676 | Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1. |
6.1 | 2022-11-02 | CVE-2022-3845 | A vulnerability has been found in phpipam and classified as problematic. Affected by this vulnerability is an unknown functionality of the file app/admin/import-export/import-load-data.php of the component Import Preview Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 22c797c3583001211fe7d31bccd3f1d4aeeb3bbc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-212863. |
6.5 | 2022-04-04 | CVE-2022-1225 | Incorrect Privilege Assignment in GitHub repository phpipam/phpipam prior to 1.4.6. |
6.5 | 2022-04-04 | CVE-2022-1224 | Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. |
6.5 | 2022-04-04 | CVE-2022-1223 | Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. |
6.1 | 2022-03-25 | CVE-2021-46426 | phpIPAM 1.4.4 allows Reflected XSS and CSRF via app/admin/subnets/find_free_section_subnets.php of the subnets functionality. |
7.2 | 2022-01-19 | CVE-2022-23046 | PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php |
4.8 | 2022-01-19 | CVE-2022-23045 | PhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the "Site title" parameter while updating the site settings. The "Site title" setting is injected in several locations which triggers the XSS. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
63% (14) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
9% (2) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
4% (1) | CWE-614 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
4% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
4% (1) | CWE-319 | Cleartext Transmission of Sensitive Information |
4% (1) | CWE-307 | Improper Restriction of Excessive Authentication Attempts |
4% (1) | CWE-266 | Incorrect Privilege Assignment |
4% (1) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |