By Rodolfo Tavares

In another research conducted by the technical consultants’ team of Tempest Security Intelligence, a new vulnerability in phpIPAM was reported. MITRE Corporation has published CVE-2021-46426 about the subject, through its service that provides large and current information of cybersecurity threats to organizations.

The phpIPAM is an open source IPs management application (IPAM). Its aim is to provide light, modern and useful IP address management. It is a PHP based application with MySQL/MariaDB database backend, using libraries such as jQuery, Ajax and HTML5/CSS3 resources.

Its version 1.4.4 is vulnerable to Reflected Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) attacks. The provided linkย  below contains references to CVE-2021-46426 which recorded an exploit of phpIPAM using the vulnerability known as Reflected XSSย  in conjunction with CSRF.

CVE-2021-46426: phpIPAM 1.4.4 allows Reflected XSS and CSRF via app/admin/subnets/find_free_section_subnets.php of the subnets functionality.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46426