VYPR
Medium severity5.9NVD Advisory· Published Nov 9, 2017· Updated May 13, 2026

CVE-2017-16759

CVE-2017-16759

Description

The installation process in LibreNMS before 2017-08-18 allows remote attackers to read arbitrary files, related to html/install.php.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
librenms/librenmsPackagist
< 1.311.31

Affected products

1

Patches

2
d3094fa6578b

security: Security Patch to deal with reported vulnerabilties (#7164)

https://github.com/librenms/librenmsDaniel PreusskerAug 18, 2017via ghsa
2 files changed · +5 2
  • html/install.php+4 2 modified
    @@ -2,7 +2,7 @@
     session_start();
     if (empty($_POST) && !empty($_SESSION) && !isset($_REQUEST['stage'])) {
         $_POST = $_SESSION;
    -} else {
    +} elseif (!file_exists("../config.php")) {
         $_SESSION = array_replace($_SESSION, $_POST);
     }
     
    @@ -52,7 +52,9 @@
     // Check we can connect to MySQL DB, if not, back to stage 1 :)
     if ($stage > 1) {
         try {
    -        dbConnect();
    +        if ($stage != 6) {
    +            dbConnect();
    +        }
             if ($stage == 2 && $_SESSION['build-ok'] == true) {
                 $stage = 3;
                 $msg = "It appears that the database is already setup so have moved onto stage $stage";
    
  • includes/dbFacile.php+1 0 modified
    @@ -58,6 +58,7 @@ function dbConnect($host = null, $user = '', $password = '', $database = '', $po
         $socket = empty($socket) ? $config['db_socket'] : $socket;
     
         $database_link = mysqli_connect('p:' . $host, $user, $password, null, $port, $socket);
    +    mysqli_options($database_link, MYSQLI_OPT_LOCAL_INFILE, false);
         if ($database_link === false) {
             $error = mysqli_connect_error();
             if ($error == 'No such file or directory') {
    
7887b2e1c715

security: Security Patch to deal with reported vulnerabilties (#7164)

https://github.com/librenms/librenmsDaniel PreusskerAug 18, 2017via ghsa
2 files changed · +5 2
  • html/install.php+4 2 modified
    @@ -2,7 +2,7 @@
     session_start();
     if (empty($_POST) && !empty($_SESSION) && !isset($_REQUEST['stage'])) {
         $_POST = $_SESSION;
    -} else {
    +} elseif (!file_exists("../config.php")) {
         $_SESSION = array_replace($_SESSION, $_POST);
     }
     
    @@ -52,7 +52,9 @@
     // Check we can connect to MySQL DB, if not, back to stage 1 :)
     if ($stage > 1) {
         try {
    -        dbConnect();
    +        if ($stage != 6) {
    +            dbConnect();
    +        }
             if ($stage == 2 && $_SESSION['build-ok'] == true) {
                 $stage = 3;
                 $msg = "It appears that the database is already setup so have moved onto stage $stage";
    
  • includes/dbFacile.php+1 0 modified
    @@ -58,6 +58,7 @@ function dbConnect($host = null, $user = '', $password = '', $database = '', $po
         $socket = empty($socket) ? $config['db_socket'] : $socket;
     
         $database_link = mysqli_connect('p:' . $host, $user, $password, null, $port, $socket);
    +    mysqli_options($database_link, MYSQLI_OPT_LOCAL_INFILE, false);
         if ($database_link === false) {
             $error = mysqli_connect_error();
             if ($error == 'No such file or directory') {
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.