All the vulnerabilites related to glpi-project - glpi
cve-2024-29889
Vulnerability from cvelistv5
Published
2024-05-07 14:05
Modified
2024-08-02 01:17
Severity ?
EPSS score ?
Summary
GLPI contains an SQL injection through the saved searches
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:10.0.10:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.15", "status": "affected", "version": "10.0.10", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29889", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-08T15:27:59.104770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T16:08:34.715Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:17:58.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g" }, { "name": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.15" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T14:05:31.713Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g" }, { "name": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7" } ], "source": { "advisory": "GHSA-8xvf-v6vv-r75g", "discovery": "UNKNOWN" }, "title": "GLPI contains an SQL injection through the saved searches" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-29889", "datePublished": "2024-05-07T14:05:31.713Z", "dateReserved": "2024-03-21T15:12:08.997Z", "dateUpdated": "2024-08-02T01:17:58.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40638
Vulnerability from cvelistv5
Published
2024-11-15 18:06
Modified
2024-11-19 14:11
Severity ?
EPSS score ?
Summary
GLPI allows account takeover via SQL Injection in AJAX scripts
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-8843-r3m7-gfqx | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.17", "status": "affected", "version": "0.85", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40638", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:21:40.209576Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T14:11:25.885Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.85, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An authenticated user can exploit multiple SQL injection vulnerabilities. One of them can be used to alter another user account data and take control of it. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:06:36.649Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8843-r3m7-gfqx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8843-r3m7-gfqx" } ], "source": { "advisory": "GHSA-8843-r3m7-gfqx", "discovery": "UNKNOWN" }, "title": "GLPI allows account takeover via SQL Injection in AJAX scripts" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-40638", "datePublished": "2024-11-15T18:06:36.649Z", "dateReserved": "2024-07-08T16:13:15.511Z", "dateUpdated": "2024-11-19T14:11:25.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42802
Vulnerability from cvelistv5
Published
2023-11-02 13:32
Modified
2024-09-05 15:16
Severity ?
EPSS score ?
Summary
GLPI vulnerable to unallowed PHP script execution
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.10 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:30:24.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.10", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.10" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42802", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T15:15:59.785620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T15:16:42.339Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.7, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-02T13:32:33.840Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.10", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.10" } ], "source": { "advisory": "GHSA-rrh2-x4ch-pq3m", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to unallowed PHP script execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-42802", "datePublished": "2023-11-02T13:32:33.840Z", "dateReserved": "2023-09-14T16:13:33.306Z", "dateUpdated": "2024-09-05T15:16:42.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41941
Vulnerability from cvelistv5
Published
2023-01-25 06:06
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
glpi contains XSS Stored inside Standard Interface Help Link href attribute
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-qqqm-7h6v-7cf4 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qqqm-7h6v-7cf4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qqqm-7h6v-7cf4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6, are subject to Cross-site Scripting. An administrator may store malicious code in help links. This issue is patched in 10.0.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T06:06:23.147Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qqqm-7h6v-7cf4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qqqm-7h6v-7cf4" } ], "source": { "advisory": "GHSA-qqqm-7h6v-7cf4", "discovery": "UNKNOWN" }, "title": "glpi contains XSS Stored inside Standard Interface Help Link href attribute" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41941", "datePublished": "2023-01-25T06:06:23.147Z", "dateReserved": "2022-09-30T16:38:28.939Z", "dateUpdated": "2024-08-03T12:56:38.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3486
Vulnerability from cvelistv5
Published
2021-05-26 21:33
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
GLPi 9.5.4 does not sanitize the metadata. This way its possible to insert XSS into plugins to execute JavaScript code.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1947653 | x_refsource_MISC | |
https://n3k00n3.github.io/blog/09042021/glpi_xss.html | x_refsource_MISC | |
https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "n/a", "versions": [ { "status": "affected", "version": "glpi 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPi 9.5.4 does not sanitize the metadata. This way its possible to insert XSS into plugins to execute JavaScript code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-26T21:33:19", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653" }, { "tags": [ "x_refsource_MISC" ], "url": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "patrick@puiterwijk.org", "ID": "CVE-2021-3486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "glpi 9.5.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPi 9.5.4 does not sanitize the metadata. This way its possible to insert XSS into plugins to execute JavaScript code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947653" }, { "name": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html", "refsource": "MISC", "url": "https://n3k00n3.github.io/blog/09042021/glpi_xss.html" }, { "name": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS", "refsource": "MISC", "url": "https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS" } ] } } } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2021-3486", "datePublished": "2021-05-26T21:33:19", "dateReserved": "2021-04-08T00:00:00", "dateUpdated": "2024-08-03T16:53:17.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31143
Vulnerability from cvelistv5
Published
2022-09-14 17:40
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Leak of sensitive information through login page error in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e=9.5.0, \u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T17:40:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978" } ], "source": { "advisory": "GHSA-6mmq-x3j2-677j", "discovery": "UNKNOWN" }, "title": "Leak of sensitive information through login page error in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31143", "STATE": "PUBLIC", "TITLE": "Leak of sensitive information through login page error in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e=9.5.0, \u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j" }, { "name": "https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978" } ] }, "source": { "advisory": "GHSA-6mmq-x3j2-677j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31143", "datePublished": "2022-09-14T17:40:09", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34106
Vulnerability from cvelistv5
Published
2023-07-05 17:48
Modified
2024-10-24 19:03
Severity ?
EPSS score ?
Summary
GLPI vulnerable to unauthorized access to User data
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34106", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T19:00:09.470779Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-24T19:03:48.145Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.68, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T17:48:32.727Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-923r-hqh4-wj7c", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to unauthorized access to User data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34106", "datePublished": "2023-07-05T17:48:32.727Z", "dateReserved": "2023-05-25T21:56:51.246Z", "dateUpdated": "2024-10-24T19:03:48.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29250
Vulnerability from cvelistv5
Published
2022-06-09 19:55
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
SQL injection in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to version 10.0.1 it is possible to add extra information by SQL injection on search pages. In order to exploit this vulnerability a user must be logged in." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-09T19:55:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw" } ], "source": { "advisory": "GHSA-5w33-4wrx-8hvw", "discovery": "UNKNOWN" }, "title": "SQL injection in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29250", "STATE": "PUBLIC", "TITLE": "SQL injection in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 10.0.1" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to version 10.0.1 it is possible to add extra information by SQL injection on search pages. In order to exploit this vulnerability a user must be logged in." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw" } ] }, "source": { "advisory": "GHSA-5w33-4wrx-8hvw", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29250", "datePublished": "2022-06-09T19:55:12", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:17:54.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24867
Vulnerability from cvelistv5
Published
2022-04-21 16:50
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
LDAP password exposure in glpi
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-21T16:50:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e" } ], "source": { "advisory": "GHSA-4r49-52q9-5fgr", "discovery": "UNKNOWN" }, "title": "LDAP password exposure in glpi", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24867", "STATE": "PUBLIC", "TITLE": "LDAP password exposure in glpi" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 10.0.0" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr" }, { "name": "https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e" } ] }, "source": { "advisory": "GHSA-4r49-52q9-5fgr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24867", "datePublished": "2022-04-21T16:50:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11062
Vulnerability from cvelistv5
Published
2020-05-12 19:25
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Reflexive XSS in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "GLPI", "versions": [ { "status": "affected", "version": "\u003e 0.68.1, \u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-12T19:25:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf" } ], "source": { "advisory": "GHSA-3xxh-f5p2-jg3h", "discovery": "UNKNOWN" }, "title": "Reflexive XSS in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11062", "STATE": "PUBLIC", "TITLE": "Reflexive XSS in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003e 0.68.1, \u003c 9.4.6" } ] } } ] }, "vendor_name": "GLPI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h" }, { "name": "https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf" } ] }, "source": { "advisory": "GHSA-3xxh-f5p2-jg3h", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11062", "datePublished": "2020-05-12T19:25:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-5696
Vulnerability from cvelistv5
Published
2013-09-23 01:00
Modified
2024-09-16 16:17
Severity ?
EPSS score ?
Summary
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
References
▼ | URL | Tags |
---|---|---|
https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php | x_refsource_CONFIRM | |
https://forge.indepnet.net/issues/4480 | x_refsource_CONFIRM | |
https://forge.indepnet.net/projects/glpi/repository/revisions/21753 | x_refsource_CONFIRM | |
https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html | x_refsource_MISC | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:22:30.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/4480" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-23T01:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/4480" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php" }, { "name": "https://forge.indepnet.net/issues/4480", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/4480" }, { "name": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753" }, { "name": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html", "refsource": "MISC", "url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-5696", "datePublished": "2013-09-23T01:00:00Z", "dateReserved": "2013-09-04T00:00:00Z", "dateUpdated": "2024-09-16T16:17:31.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15175
Vulnerability from cvelistv5
Published
2020-10-07 18:45
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Unauthenticated File Deletion in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.2, the `\u200bpluginimage.send.php\u200b` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in \u201c/files/\u201d. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552 Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T18:45:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65" } ], "source": { "advisory": "GHSA-rm52-jx9h-rwcp", "discovery": "UNKNOWN" }, "title": "Unauthenticated File Deletion in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15175", "STATE": "PUBLIC", "TITLE": "Unauthenticated File Deletion in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.2, the `\u200bpluginimage.send.php\u200b` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in \u201c/files/\u201d. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-552 Files or Directories Accessible to External Parties" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp" }, { "name": "https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65" } ] }, "source": { "advisory": "GHSA-rm52-jx9h-rwcp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15175", "datePublished": "2020-10-07T18:45:14", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28636
Vulnerability from cvelistv5
Published
2023-04-05 17:21
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
GLPI vulnerable to stored Cross-site Scripting in external links
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.60, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T17:21:22.297Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-55pm-mc2m-pq46", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to stored Cross-site Scripting in external links" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28636", "datePublished": "2023-04-05T17:21:22.297Z", "dateReserved": "2023-03-20T12:19:47.208Z", "dateUpdated": "2024-08-02T13:43:23.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1010307
Vulnerability from cvelistv5
Published
2019-07-15 17:05
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the "Link Tickets" feature, 3- a request to the endpoint fetches js and executes it.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.3.1 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
GLPI | GLPI Product |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:07:18.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI Product", "vendor": "GLPI", "versions": [ { "status": "affected", "version": "9.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the \"Link Tickets\" feature, 3- a request to the endpoint fetches js and executes it." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-15T17:05:18", "orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "shortName": "dwf" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI Product", "version": { "version_data": [ { "version_value": "9.3.1" } ] } } ] }, "vendor_name": "GLPI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the \"Link Tickets\" feature, 3- a request to the endpoint fetches js and executes it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.3.1", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "name": "https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "assignerShortName": "dwf", "cveId": "CVE-2019-1010307", "datePublished": "2019-07-15T17:05:18", "dateReserved": "2019-03-20T00:00:00", "dateUpdated": "2024-08-05T03:07:18.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11183
Vulnerability from cvelistv5
Published
2017-07-28 05:00
Modified
2024-08-05 17:57
Severity ?
EPSS score ?
Summary
front/backup.php in GLPI before 9.1.5 allows remote authenticated administrators to delete arbitrary files via a crafted file parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2450 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/9.1.5 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:57:57.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "front/backup.php in GLPI before 9.1.5 allows remote authenticated administrators to delete arbitrary files via a crafted file parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T04:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11183", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "front/backup.php in GLPI before 9.1.5 allows remote authenticated administrators to delete arbitrary files via a crafted file parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2450", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2450" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.1.5", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11183", "datePublished": "2017-07-28T05:00:00", "dateReserved": "2017-07-11T00:00:00", "dateUpdated": "2024-08-05T17:57:57.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24868
Vulnerability from cvelistv5
Published
2022-04-21 16:55
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Cross site scripting via SVG file upload in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-21T16:55:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f" } ], "source": { "advisory": "GHSA-9hg4-fpwv-gx78", "discovery": "UNKNOWN" }, "title": "Cross site scripting via SVG file upload in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24868", "STATE": "PUBLIC", "TITLE": "Cross site scripting via SVG file upload in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 10.0.0" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78" }, { "name": "https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f" } ] }, "source": { "advisory": "GHSA-9hg4-fpwv-gx78", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24868", "datePublished": "2022-04-21T16:55:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41323
Vulnerability from cvelistv5
Published
2023-09-26 22:35
Modified
2024-09-23 20:20
Severity ?
EPSS score ?
Summary
Users login enumeration by unauthenticated user in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41323", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:20:35.679274Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:20:51.213Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.68, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:35:37.108Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9" } ], "source": { "advisory": "GHSA-5cf4-6q6r-49x9", "discovery": "UNKNOWN" }, "title": "Users login enumeration by unauthenticated user in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41323", "datePublished": "2023-09-26T22:35:37.108Z", "dateReserved": "2023-08-28T16:56:43.366Z", "dateUpdated": "2024-09-23T20:20:51.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43813
Vulnerability from cvelistv5
Published
2023-12-13 18:17
Modified
2024-08-02 19:52
Severity ?
EPSS score ?
Summary
glpi Authenticated SQL Injection
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.11 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362" }, { "name": "https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T18:17:21.359Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362" }, { "name": "https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "source": { "advisory": "GHSA-94c3-fw5r-3362", "discovery": "UNKNOWN" }, "title": "glpi Authenticated SQL Injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-43813", "datePublished": "2023-12-13T18:17:21.359Z", "dateReserved": "2023-09-22T14:51:42.341Z", "dateUpdated": "2024-08-02T19:52:11.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11329
Vulnerability from cvelistv5
Published
2017-07-14 16:00
Modified
2024-09-16 18:03
Severity ?
EPSS score ?
Summary
GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2456 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/9.1.5 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:05:30.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2456" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-14T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2456" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2456", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2456" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.1.5", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11329", "datePublished": "2017-07-14T16:00:00Z", "dateReserved": "2017-07-14T00:00:00Z", "dateUpdated": "2024-09-16T18:03:33.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21324
Vulnerability from cvelistv5
Published
2021-03-08 17:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Insecure Direct Object Reference (IDOR) on "Solutions"
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket\u0026item_items_id=18\u0026forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-09T16:23:01", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" } ], "source": { "advisory": "GHSA-jvwm-gq36-3v7v", "discovery": "UNKNOWN" }, "title": "Insecure Direct Object Reference (IDOR) on \"Solutions\"", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21324", "STATE": "PUBLIC", "TITLE": "Insecure Direct Object Reference (IDOR) on \"Solutions\"" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on \"Solutions\". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /\"glpi/front/knowbaseitem.php?item_itemtype=Ticket\u0026item_items_id=18\u0026forcetab=Knowbase$1\", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with \"Users\" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639 Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jvwm-gq36-3v7v" } ] }, "source": { "advisory": "GHSA-jvwm-gq36-3v7v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21324", "datePublished": "2021-03-08T17:00:33", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27663
Vulnerability from cvelistv5
Published
2020-11-26 16:49
Modified
2024-08-04 16:18
Severity ?
EPSS score ?
Summary
In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.).
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-26T16:49:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27663", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27663", "datePublished": "2020-11-26T16:49:03", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:45.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27096
Vulnerability from cvelistv5
Published
2024-03-18 16:11
Modified
2024-08-02 00:27
Severity ?
EPSS score ?
Summary
SQL Injection in through the search engine
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-19T14:28:37.280479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:46:29.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv" }, { "name": "https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in the search engine to extract data from the database. This issue has been patched in version 10.0.13." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-18T16:11:08.100Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv" }, { "name": "https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-2x8m-vrcm-2jqv", "discovery": "UNKNOWN" }, "title": "SQL Injection in through the search engine" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27096", "datePublished": "2024-03-18T16:11:08.100Z", "dateReserved": "2024-02-19T14:43:05.993Z", "dateUpdated": "2024-08-02T00:27:59.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21720
Vulnerability from cvelistv5
Published
2022-01-28 10:15
Modified
2024-08-03 02:53
Severity ?
EPSS score ?
Summary
SQL injection using custom CSS administration form in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.7 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:53:34.845Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-28T10:15:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" } ], "source": { "advisory": "GHSA-5hg4-r64r-rf83", "discovery": "UNKNOWN" }, "title": "SQL injection using custom CSS administration form in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21720", "STATE": "PUBLIC", "TITLE": "SQL injection using custom CSS administration form in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83" }, { "name": "https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.7", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" } ] }, "source": { "advisory": "GHSA-5hg4-r64r-rf83", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21720", "datePublished": "2022-01-28T10:15:14", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:53:34.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45608
Vulnerability from cvelistv5
Published
2024-11-15 18:24
Modified
2024-11-15 18:40
Severity ?
EPSS score ?
Summary
GLPI has an Authenticated SQL Injection
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-67p8-v79j-jp86 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45608", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:40:38.929020Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:40:55.776Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An authenticated user can perfom a SQL injection by changing its preferences. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:24:48.240Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-67p8-v79j-jp86", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-67p8-v79j-jp86" } ], "source": { "advisory": "GHSA-67p8-v79j-jp86", "discovery": "UNKNOWN" }, "title": "GLPI has an Authenticated SQL Injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45608", "datePublished": "2024-11-15T18:24:48.240Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-11-15T18:40:55.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27098
Vulnerability from cvelistv5
Published
2024-03-18 16:14
Modified
2024-08-02 00:27
Severity ?
EPSS score ?
Summary
Blind Server-Side Request Forgery (SSRF) using Arbitrary Object Instantiation in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27098", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-19T15:47:43.513847Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:14.574Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w" }, { "name": "https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can execute a SSRF based attack using Arbitrary Object Instantiation. This issue has been patched in version 10.0.13." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-18T16:14:18.894Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w" }, { "name": "https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-92x4-q9w5-837w", "discovery": "UNKNOWN" }, "title": "Blind Server-Side Request Forgery (SSRF) using Arbitrary Object Instantiation in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27098", "datePublished": "2024-03-18T16:14:18.894Z", "dateReserved": "2024-02-19T14:43:05.993Z", "dateUpdated": "2024-08-02T00:27:59.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11031
Vulnerability from cvelistv5
Published
2020-09-23 15:20
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Insecure encryption algorithm in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7xwm-4vjr-jvqh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T15:20:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7xwm-4vjr-jvqh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780" } ], "source": { "advisory": "GHSA-7xwm-4vjr-jvqh", "discovery": "UNKNOWN" }, "title": "Insecure encryption algorithm in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11031", "STATE": "PUBLIC", "TITLE": "Insecure encryption algorithm in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003c 9.5.0" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7xwm-4vjr-jvqh", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7xwm-4vjr-jvqh" }, { "name": "https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780" } ] }, "source": { "advisory": "GHSA-7xwm-4vjr-jvqh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11031", "datePublished": "2020-09-23T15:20:13", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28632
Vulnerability from cvelistv5
Published
2023-04-05 14:45
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
GLPI vulnerable to account takeover by authenticated user
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.83, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the \"forgotten password\" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to `Forgotten password?` event. However, it will not prevent unauthorized modification of any user emails." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T14:45:12.075Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-7pwm-pg76-3q9x", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to account takeover by authenticated user" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28632", "datePublished": "2023-04-05T14:45:12.075Z", "dateReserved": "2023-03-20T12:19:47.207Z", "dateUpdated": "2024-08-02T13:43:23.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35914
Vulnerability from cvelistv5
Published
2022-09-19 00:00
Modified
2024-08-03 09:44
Severity ?
EPSS score ?
Summary
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:44:22.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?\u0026Sfs=htmLawedTest.php\u0026Sl=.%2Finternal_utilities%2FhtmLawed" }, { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases" }, { "tags": [ "x_transferred" ], "url": "https://glpi-project.org/fr/glpi-10-0-3-disponible/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?\u0026Sfs=htmLawedTest.php\u0026Sl=.%2Finternal_utilities%2FhtmLawed" }, { "url": "https://github.com/glpi-project/glpi/releases" }, { "url": "https://glpi-project.org/fr/glpi-10-0-3-disponible/" }, { "url": "http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35914", "datePublished": "2022-09-19T00:00:00", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:44:22.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28633
Vulnerability from cvelistv5
Published
2023-04-05 15:27
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
GLPI vulnerable to Blind Server-Side Request Forgery (SSRF) in RSS feeds
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf" }, { "name": "https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.84, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T15:27:58.849Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf" }, { "name": "https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-r57v-j88m-rwwf", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to Blind Server-Side Request Forgery (SSRF) in RSS feeds" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28633", "datePublished": "2023-04-05T15:27:58.849Z", "dateReserved": "2023-03-20T12:19:47.207Z", "dateUpdated": "2024-08-02T13:43:23.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34244
Vulnerability from cvelistv5
Published
2023-07-05 19:22
Modified
2024-10-21 21:11
Severity ?
EPSS score ?
Summary
GLPI vulnerable to reflected XSS in search pages
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34244", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-21T21:07:00.474620Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T21:11:18.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.4.0, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T19:22:07.569Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-p93p-pwg9-w95w", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to reflected XSS in search pages" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34244", "datePublished": "2023-07-05T19:22:07.569Z", "dateReserved": "2023-05-31T13:51:51.172Z", "dateUpdated": "2024-10-21T21:11:18.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41888
Vulnerability from cvelistv5
Published
2023-09-26 22:44
Modified
2024-09-23 19:32
Severity ?
EPSS score ?
Summary
Phishing through a login page malicious URL in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41888", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T18:54:27.599424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:32:50.812Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.8, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:44:02.121Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp" } ], "source": { "advisory": "GHSA-2hcg-75jj-hghp", "discovery": "UNKNOWN" }, "title": "Phishing through a login page malicious URL in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41888", "datePublished": "2023-09-26T22:44:02.121Z", "dateReserved": "2023-09-04T16:31:48.224Z", "dateUpdated": "2024-09-23T19:32:50.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11060
Vulnerability from cvelistv5
Published
2020-05-12 19:30
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Remote Code Execution in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c | x_refsource_MISC | |
http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-14T17:06:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html" } ], "source": { "advisory": "GHSA-cvvq-3fww-5v6f", "discovery": "UNKNOWN" }, "title": "Remote Code Execution in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11060", "STATE": "PUBLIC", "TITLE": "Remote Code Execution in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f" }, { "name": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c" }, { "name": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.html" } ] }, "source": { "advisory": "GHSA-cvvq-3fww-5v6f", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11060", "datePublished": "2020-05-12T19:30:14", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1010310
Vulnerability from cvelistv5
Published
2019-07-12 17:45
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools > Reminder > Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. The fixed version is: 9.4.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.3.1 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/pull/5519 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
GLPI | GLPI Product |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:07:18.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/pull/5519" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI Product", "vendor": "GLPI", "versions": [ { "status": "affected", "version": "9.3.1 [fixed: 9.4.1]" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools \u003e Reminder \u003e Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. The fixed version is: 9.4.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Frame and Form tags Injection allowing admins to phish users by putting code in reminder description", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-12T17:45:56", "orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "shortName": "dwf" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/pull/5519" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI Product", "version": { "version_data": [ { "version_value": "9.3.1 [fixed: 9.4.1]" } ] } } ] }, "vendor_name": "GLPI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools \u003e Reminder \u003e Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. The fixed version is: 9.4.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Frame and Form tags Injection allowing admins to phish users by putting code in reminder description" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.3.1", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.3.1" }, { "name": "https://github.com/glpi-project/glpi/pull/5519", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/pull/5519" } ] } } } }, "cveMetadata": { "assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "assignerShortName": "dwf", "cveId": "CVE-2019-1010310", "datePublished": "2019-07-12T17:45:56", "dateReserved": "2019-03-20T00:00:00", "dateUpdated": "2024-08-05T03:07:18.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35939
Vulnerability from cvelistv5
Published
2023-07-05 20:42
Modified
2024-10-18 19:57
Severity ?
EPSS score ?
Summary
GLPI vulnerable to unauthorized access to Dashboard data
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:41.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.8", "status": "affected", "version": "9.5.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-35939", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:55:19.868827Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:57:17.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a on a file accessible by an authenticated user (or not for certain actions), allows a threat actor to interact, modify, or see Dashboard data. Version 10.0.8 contains a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T20:42:52.139Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-cjcx-pwcx-v34c", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to unauthorized access to Dashboard data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35939", "datePublished": "2023-07-05T20:42:52.139Z", "dateReserved": "2023-06-20T14:02:45.594Z", "dateUpdated": "2024-10-18T19:57:17.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41326
Vulnerability from cvelistv5
Published
2023-09-26 22:40
Modified
2024-09-23 20:15
Severity ?
EPSS score ?
Summary
Account takeover via Kanban feature in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:33.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41326", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:15:41.523483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:15:50.243Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:40:49.778Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9" } ], "source": { "advisory": "GHSA-5wj6-hp4c-j5q9", "discovery": "UNKNOWN" }, "title": "Account takeover via Kanban feature in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41326", "datePublished": "2023-09-26T22:40:49.778Z", "dateReserved": "2023-08-28T16:56:43.366Z", "dateUpdated": "2024-09-23T20:15:50.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-31456
Vulnerability from cvelistv5
Published
2024-05-07 14:07
Modified
2024-08-02 01:52
Severity ?
EPSS score ?
Summary
GLPI contains an authenticated SQL injection
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.15", "status": "unknown", "version": "-", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31456", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-07T18:07:41.112086Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:36:07.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j" }, { "name": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.15" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability from map search. This vulnerability is fixed in 10.0.15." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-07T14:07:08.277Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j" }, { "name": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26" } ], "source": { "advisory": "GHSA-gcj4-2cp3-6h5j", "discovery": "UNKNOWN" }, "title": "GLPI contains an authenticated SQL injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31456", "datePublished": "2024-05-07T14:07:08.277Z", "dateReserved": "2024-04-03T17:55:32.646Z", "dateUpdated": "2024-08-02T01:52:56.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27914
Vulnerability from cvelistv5
Published
2024-03-18 16:19
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
Reflected Cross-Site Scripting (XSS) in search engine when debug mode is enabled in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r" }, { "name": "https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-27914", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T15:25:44.198285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T15:25:55.247Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.8, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI administrator in order to exploit a reflected XSS vulnerability. The XSS will only trigger if the administrator navigates through the debug bar. This issue has been patched in version 10.0.13.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-18T16:19:00.298Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r" }, { "name": "https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-rcxj-fqr4-q34r", "discovery": "UNKNOWN" }, "title": "Reflected Cross-Site Scripting (XSS) in search engine when debug mode is enabled in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27914", "datePublished": "2024-03-18T16:19:00.298Z", "dateReserved": "2024-02-28T15:14:14.213Z", "dateUpdated": "2024-08-02T15:25:55.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11036
Vulnerability from cvelistv5
Published
2020-05-05 21:35
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
XSS in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content \"\u003cscript\u003ealert(1)\u003c/script\u003e\" reproduces the attack. This can be exploited by a user with administrator privileges in the User-Agent field. It can also be exploited by an outside party through the following steps: 1. Create a user with the surname `\" onmouseover=\"alert(document.cookie)` and an empty first name. 2. With this user, create a ticket 3. As an administrator (or other privileged user) open the created ticket 4. On the \"last update\" field, put your mouse on the name of the user 5. The XSS fires This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-15T04:06:23", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "source": { "advisory": "GHSA-3g3h-rwhr-7385", "discovery": "UNKNOWN" }, "title": "XSS in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11036", "STATE": "PUBLIC", "TITLE": "XSS in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content \"\u003cscript\u003ealert(1)\u003c/script\u003e\" reproduces the attack. This can be exploited by a user with administrator privileges in the User-Agent field. It can also be exploited by an outside party through the following steps: 1. Create a user with the surname `\" onmouseover=\"alert(document.cookie)` and an empty first name. 2. With this user, create a ticket 3. As an administrator (or other privileged user) open the created ticket 4. On the \"last update\" field, put your mouse on the name of the user 5. The XSS fires This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385" }, { "name": "FEDORA-2020-ee30e1109f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ] }, "source": { "advisory": "GHSA-3g3h-rwhr-7385", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11036", "datePublished": "2020-05-05T21:35:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5248
Vulnerability from cvelistv5
Published
2020-05-12 16:05
Modified
2024-08-04 08:22
Severity ?
EPSS score ?
Summary
Public GLPIKEY can be used to decrypt any data in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:09.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key. Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798: Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-12T16:05:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c" } ], "source": { "advisory": "GHSA-j222-j9mf-h6j9", "discovery": "UNKNOWN" }, "title": "Public GLPIKEY can be used to decrypt any data in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-5248", "STATE": "PUBLIC", "TITLE": "Public GLPIKEY can be used to decrypt any data in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key. Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798: Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9" }, { "name": "https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c" } ] }, "source": { "advisory": "GHSA-j222-j9mf-h6j9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-5248", "datePublished": "2020-05-12T16:05:17", "dateReserved": "2020-01-02T00:00:00", "dateUpdated": "2024-08-04T08:22:09.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21255
Vulnerability from cvelistv5
Published
2021-03-02 19:40
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
entities switch IDOR
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:14.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "= 9.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI version 9.5.3, it was possible to switch entities with IDOR from a logged in user. This is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-02T19:40:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" } ], "source": { "advisory": "GHSA-v3m5-r3mx-ff9j", "discovery": "UNKNOWN" }, "title": "entities switch IDOR", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21255", "STATE": "PUBLIC", "TITLE": "entities switch IDOR" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "= 9.5.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI version 9.5.3, it was possible to switch entities with IDOR from a logged in user. This is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v3m5-r3mx-ff9j" }, { "name": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/aade65b7f67d46f23d276a8acb0df70651c3b1dc" } ] }, "source": { "advisory": "GHSA-v3m5-r3mx-ff9j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21255", "datePublished": "2021-03-02T19:40:20", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:14.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21325
Vulnerability from cvelistv5
Published
2021-03-08 17:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Stored XSS in budget type
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-08T17:00:27", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" } ], "source": { "advisory": "GHSA-m574-f3jw-pwrf", "discovery": "UNKNOWN" }, "title": "Stored XSS in budget type", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21325", "STATE": "PUBLIC", "TITLE": "Stored XSS in budget type" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 a new budget type can be defined by user. This input is not correctly filtered. This results in a cross-site scripting attack. To exploit this endpoint attacker need to be authenticated. This is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-m574-f3jw-pwrf" } ] }, "source": { "advisory": "GHSA-m574-f3jw-pwrf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21325", "datePublished": "2021-03-08T17:00:27", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10233
Vulnerability from cvelistv5
Published
2019-03-27 16:23
Modified
2024-08-04 22:17
Severity ?
EPSS score ?
Summary
Teclib GLPI before 9.4.1.1 is affected by a timing attack associated with a cookie.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.4.1.1 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/pull/5562 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:17:19.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/pull/5562" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Teclib GLPI before 9.4.1.1 is affected by a timing attack associated with a cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T16:23:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/pull/5562" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-10233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Teclib GLPI before 9.4.1.1 is affected by a timing attack associated with a cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.4.1.1", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1.1" }, { "name": "https://github.com/glpi-project/glpi/pull/5562", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/pull/5562" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-10233", "datePublished": "2019-03-27T16:23:27", "dateReserved": "2019-03-27T00:00:00", "dateUpdated": "2024-08-04T22:17:19.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27937
Vulnerability from cvelistv5
Published
2024-03-18 15:17
Modified
2024-08-02 00:41
Severity ?
EPSS score ?
Summary
glpi Users emails enumeration
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da | x_refsource_MISC | |
https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27937", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-21T16:04:39.930629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:14.396Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj" }, { "name": "https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da" }, { "name": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can obtain the email address of all GLPI users. This issue has been patched in version 10.0.13.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-24T14:41:40.256Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj" }, { "name": "https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da" }, { "name": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", "tags": [ "x_refsource_MISC" ], "url": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-98qw-hpg3-2hpj", "discovery": "UNKNOWN" }, "title": "glpi Users emails enumeration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27937", "datePublished": "2024-03-18T15:17:18.178Z", "dateReserved": "2024-02-28T15:14:14.217Z", "dateUpdated": "2024-08-02T00:41:55.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15217
Vulnerability from cvelistv5
Published
2020-10-07 19:10
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
User data exposure in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 9.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T19:10:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2" } ], "source": { "advisory": "GHSA-x9hg-j29f-wvvv", "discovery": "UNKNOWN" }, "title": "User data exposure in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15217", "STATE": "PUBLIC", "TITLE": "User data exposure in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.5.0, \u003c 9.5.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv" }, { "name": "https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2" } ] }, "source": { "advisory": "GHSA-x9hg-j29f-wvvv", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15217", "datePublished": "2020-10-07T19:10:13", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28849
Vulnerability from cvelistv5
Published
2023-04-05 17:41
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
GLPI vulnerable to SQL injection and Stored XSS via inventory agent request
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T17:41:20.945Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" } ], "source": { "advisory": "GHSA-9r84-jpg3-h4m6", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to SQL injection and Stored XSS via inventory agent request" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28849", "datePublished": "2023-04-05T17:41:20.945Z", "dateReserved": "2023-03-24T16:25:34.467Z", "dateUpdated": "2024-08-02T13:51:38.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41679
Vulnerability from cvelistv5
Published
2024-11-15 18:20
Modified
2024-11-15 18:41
Severity ?
EPSS score ?
Summary
Authenticated SQL injection in ticket form
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-hq9q-jfhp-qqgm | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41679", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:41:35.000144Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:41:51.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An authenticated user can exploit a SQL injection vulnerability from the ticket form. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:20:44.135Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hq9q-jfhp-qqgm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hq9q-jfhp-qqgm" } ], "source": { "advisory": "GHSA-hq9q-jfhp-qqgm", "discovery": "UNKNOWN" }, "title": "Authenticated SQL injection in ticket form" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41679", "datePublished": "2024-11-15T18:20:44.135Z", "dateReserved": "2024-07-18T15:21:47.487Z", "dateUpdated": "2024-11-15T18:41:51.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27662
Vulnerability from cvelistv5
Published
2020-11-26 16:46
Modified
2024-08-04 16:18
Severity ?
EPSS score ?
Summary
In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:45.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-26T16:46:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27662", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27662", "datePublished": "2020-11-26T16:46:53", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:45.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37147
Vulnerability from cvelistv5
Published
2024-07-10 18:38
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
GLPI allows Authenticated File Upload to Restricted Tickets
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37147", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-12T20:15:52.593340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T20:16:00.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:54.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.85, \u003c 10.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-10T18:38:37.588Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f2cg-fc85-ffmh" } ], "source": { "advisory": "GHSA-f2cg-fc85-ffmh", "discovery": "UNKNOWN" }, "title": "GLPI allows Authenticated File Upload to Restricted Tickets" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37147", "datePublished": "2024-07-10T18:38:37.588Z", "dateReserved": "2024-06-03T17:29:38.327Z", "dateUpdated": "2024-08-02T03:50:54.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39213
Vulnerability from cvelistv5
Published
2021-09-15 17:05
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
IP restriction on GLPI API Bypass with custom header injection
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.6 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.1, \u003c 9.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T17:05:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777" } ], "source": { "advisory": "GHSA-6w9f-2m6g-5777", "discovery": "UNKNOWN" }, "title": "IP restriction on GLPI API Bypass with custom header injection", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39213", "STATE": "PUBLIC", "TITLE": "IP restriction on GLPI API Bypass with custom header injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.1, \u003c 9.5.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6w9f-2m6g-5777" } ] }, "source": { "advisory": "GHSA-6w9f-2m6g-5777", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39213", "datePublished": "2021-09-15T17:05:09", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45611
Vulnerability from cvelistv5
Published
2024-11-15 20:16
Modified
2024-11-19 14:13
Severity ?
EPSS score ?
Summary
GLPI has a stored XSS at src/RSSFeed.php
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.17", "status": "affected", "version": "0.84", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45611", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T21:10:39.274740Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T14:13:31.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.84, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T20:16:18.459Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479" } ], "source": { "advisory": "GHSA-j73h-x6j3-m479", "discovery": "UNKNOWN" }, "title": "GLPI has a stored XSS at src/RSSFeed.php" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45611", "datePublished": "2024-11-15T20:16:18.459Z", "dateReserved": "2024-09-02T16:00:02.425Z", "dateUpdated": "2024-11-19T14:13:31.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31068
Vulnerability from cvelistv5
Published
2022-06-28 17:50
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Sensitive Data Exposure on Refused Inventory Files in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e=10.0.0, \u003c 10.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T17:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5" } ], "source": { "advisory": "GHSA-g4hm-6vfr-q3wg", "discovery": "UNKNOWN" }, "title": "Sensitive Data Exposure on Refused Inventory Files in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31068", "STATE": "PUBLIC", "TITLE": "Sensitive Data Exposure on Refused Inventory Files in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e=10.0.0, \u003c 10.0.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg" }, { "name": "https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5" } ] }, "source": { "advisory": "GHSA-g4hm-6vfr-q3wg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31068", "datePublished": "2022-06-28T17:50:11", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28634
Vulnerability from cvelistv5
Published
2023-04-05 16:06
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
GLPI vulnerable to Privilege Escalation from Technician to Super-Admin
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.83, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T16:06:11.361Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-4279-rxmh-gf39", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to Privilege Escalation from Technician to Super-Admin" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28634", "datePublished": "2023-04-05T16:06:11.361Z", "dateReserved": "2023-03-20T12:19:47.208Z", "dateUpdated": "2024-08-02T13:43:23.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23610
Vulnerability from cvelistv5
Published
2023-01-25 05:46
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
glpi vulnerable to Unauthorized access to data export
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 9.5.12" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions prior to 9.5.12 and 10.0.6 are vulnerable to Improper Privilege Management. Any user having access to the standard interface can export data of almost any GLPI item type, even those on which user is not allowed to access (including assets, tickets, users, ...). This issue is patched in 10.0.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T05:46:35.549Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6565-hm87-24hf" } ], "source": { "advisory": "GHSA-6565-hm87-24hf", "discovery": "UNKNOWN" }, "title": "glpi vulnerable to Unauthorized access to data export" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23610", "datePublished": "2023-01-25T05:46:35.549Z", "dateReserved": "2023-01-16T17:07:46.242Z", "dateUpdated": "2024-08-02T10:35:33.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22724
Vulnerability from cvelistv5
Published
2023-01-25 05:55
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
glpi contains XSS in RSS Description Link
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions prior to 10.0.6 are subject to Cross-site Scripting via malicious RSS feeds. An Administrator can import a malicious RSS feed that contains Cross Site Scripting (XSS) payloads inside RSS links. Victims who wish to visit an RSS content and click on the link will execute the Javascript. This issue is patched in 10.0.6.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T05:55:10.180Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff" } ], "source": { "advisory": "GHSA-x9g4-j85w-cmff", "discovery": "UNKNOWN" }, "title": "glpi contains XSS in RSS Description Link" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22724", "datePublished": "2023-01-25T05:55:10.180Z", "dateReserved": "2023-01-06T14:21:05.890Z", "dateUpdated": "2024-08-02T10:13:50.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26212
Vulnerability from cvelistv5
Published
2020-11-25 17:05
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
Any GLPI CalDAV calendars is read-only for every authenticated user
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.3 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. Steps to reproduce the behavior: 1. Create a new planning with \u0027eduardo.mozart\u0027 user (from \u0027IT\u0027 group that belongs to \u0027Super-admin\u0027) into it\u0027s personal planning at \u0027Assistance\u0027 \u003e \u0027Planning\u0027. 2. Copy the CalDAV url and use a CalDAV client (e.g. Thunderbird) to sync the planning with the provided URL. 3. Inform the username and password from any valid user (e.g. \u0027camila\u0027 from \u0027Proativa\u0027 group). 4. \u0027Camila\u0027 has read-only access to \u0027eduardo.mozart\u0027 personal planning. The same behavior happens to any group. E.g. \u0027Camila\u0027 has access to \u0027IT\u0027 group planning, even if she doesn\u0027t belong to this group and has a \u0027Self-service\u0027 profile permission). This issue is fixed in version 9.5.3. As a workaround, one can remove the `caldav.php` file to block access to CalDAV server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-25T17:05:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.3" } ], "source": { "advisory": "GHSA-qmw3-87hr-5wgx", "discovery": "UNKNOWN" }, "title": "Any GLPI CalDAV calendars is read-only for every authenticated user", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26212", "STATE": "PUBLIC", "TITLE": "Any GLPI CalDAV calendars is read-only for every authenticated user" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. Steps to reproduce the behavior: 1. Create a new planning with \u0027eduardo.mozart\u0027 user (from \u0027IT\u0027 group that belongs to \u0027Super-admin\u0027) into it\u0027s personal planning at \u0027Assistance\u0027 \u003e \u0027Planning\u0027. 2. Copy the CalDAV url and use a CalDAV client (e.g. Thunderbird) to sync the planning with the provided URL. 3. Inform the username and password from any valid user (e.g. \u0027camila\u0027 from \u0027Proativa\u0027 group). 4. \u0027Camila\u0027 has read-only access to \u0027eduardo.mozart\u0027 personal planning. The same behavior happens to any group. E.g. \u0027Camila\u0027 has access to \u0027IT\u0027 group planning, even if she doesn\u0027t belong to this group and has a \u0027Self-service\u0027 profile permission). This issue is fixed in version 9.5.3. As a workaround, one can remove the `caldav.php` file to block access to CalDAV server." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx" }, { "name": "https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.3", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.3" } ] }, "source": { "advisory": "GHSA-qmw3-87hr-5wgx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26212", "datePublished": "2020-11-25T17:05:17", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:49:07.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4002
Vulnerability from cvelistv5
Published
2012-10-09 23:00
Modified
2024-08-06 20:21
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/07/13/1 | mailing-list, x_refsource_MLIST | |
https://forge.indepnet.net/issues/3707 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:132 | vendor-advisory, x_refsource_MANDRIVA | |
https://forge.indepnet.net/issues/3704 | x_refsource_CONFIRM | |
https://forge.indepnet.net/projects/glpi/versions/771 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:21:04.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/3707" }, { "name": "MDVSA-2012:132", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/3704" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/3707" }, { "name": "MDVSA-2012:132", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/3704" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "name": "https://forge.indepnet.net/issues/3707", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/3707" }, { "name": "MDVSA-2012:132", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "name": "https://forge.indepnet.net/issues/3704", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/3704" }, { "name": "https://forge.indepnet.net/projects/glpi/versions/771", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4002", "datePublished": "2012-10-09T23:00:00", "dateReserved": "2012-07-12T00:00:00", "dateUpdated": "2024-08-06T20:21:04.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43417
Vulnerability from cvelistv5
Published
2024-11-15 18:22
Modified
2024-11-15 18:41
Severity ?
EPSS score ?
Summary
Reflected XSS in Software form
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-p633-wfj5-8x44 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43417", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:41:16.240249Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:41:33.591Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Software form. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:22:03.977Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p633-wfj5-8x44", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p633-wfj5-8x44" } ], "source": { "advisory": "GHSA-p633-wfj5-8x44", "discovery": "UNKNOWN" }, "title": "Reflected XSS in Software form" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-43417", "datePublished": "2024-11-15T18:22:03.977Z", "dateReserved": "2024-08-12T18:02:04.967Z", "dateUpdated": "2024-11-15T18:41:33.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41322
Vulnerability from cvelistv5
Published
2023-09-26 22:34
Modified
2024-09-23 20:21
Severity ?
EPSS score ?
Summary
Privilege Escalation from technician to super-admin in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41322", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:21:21.823469Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:21:30.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.1.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter\u0027s password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:34:06.088Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr" } ], "source": { "advisory": "GHSA-9j8m-7563-8xvr", "discovery": "UNKNOWN" }, "title": "Privilege Escalation from technician to super-admin in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41322", "datePublished": "2023-09-26T22:34:06.088Z", "dateReserved": "2023-08-28T16:56:43.365Z", "dateUpdated": "2024-09-23T20:21:30.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39211
Vulnerability from cvelistv5
Published
2021-09-15 16:55
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Disclosure of GLPI and server information in telemetry endpoint
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.6 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.2, \u003c 9.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T16:55:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825" } ], "source": { "advisory": "GHSA-xx66-v3g5-w825", "discovery": "UNKNOWN" }, "title": "Disclosure of GLPI and server information in telemetry endpoint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39211", "STATE": "PUBLIC", "TITLE": "Disclosure of GLPI and server information in telemetry endpoint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.2, \u003c 9.5.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xx66-v3g5-w825" } ] }, "source": { "advisory": "GHSA-xx66-v3g5-w825", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39211", "datePublished": "2021-09-15T16:55:10", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37148
Vulnerability from cvelistv5
Published
2024-07-10 19:18
Modified
2024-11-19 14:15
Severity ?
EPSS score ?
Summary
GLPI allows account takeover via SQL Injection in AJAX scripts
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.16", "status": "affected", "version": "0.84", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T20:16:39.136217Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T14:15:49.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.84, \u003c 10.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in some AJAX scripts to alter another user account data and take control of it. Upgrade to 10.0.16." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-10T19:18:09.444Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj" } ], "source": { "advisory": "GHSA-p626-hph9-p6fj", "discovery": "UNKNOWN" }, "title": "GLPI allows account takeover via SQL Injection in AJAX scripts" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37148", "datePublished": "2024-07-10T19:18:09.444Z", "dateReserved": "2024-06-03T17:29:38.328Z", "dateUpdated": "2024-11-19T14:15:49.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42462
Vulnerability from cvelistv5
Published
2023-09-26 22:46
Modified
2024-09-23 19:26
Severity ?
EPSS score ?
Summary
File deletion through document upload process in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:38.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42462", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T18:53:57.154484Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:26:41.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:46:27.213Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75" } ], "source": { "advisory": "GHSA-hm76-jh96-7j75", "discovery": "UNKNOWN" }, "title": "File deletion through document upload process in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-42462", "datePublished": "2023-09-26T22:46:27.213Z", "dateReserved": "2023-09-08T20:57:45.575Z", "dateUpdated": "2024-09-23T19:26:41.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51446
Vulnerability from cvelistv5
Published
2024-02-01 15:25
Modified
2024-08-02 22:32
Severity ?
EPSS score ?
Summary
GLPI LDAP Injection during authentication
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-p995-jmfv-c7r8 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/58c67d78f2e3ad08264213e9aaf56eab3c9ded35 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.12 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-51446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T18:21:09.651785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:22:52.360Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:32:09.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p995-jmfv-c7r8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p995-jmfv-c7r8" }, { "name": "https://github.com/glpi-project/glpi/commit/58c67d78f2e3ad08264213e9aaf56eab3c9ded35", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/58c67d78f2e3ad08264213e9aaf56eab3c9ded35" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.12", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.70, \u003c 10.0.12" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-90", "description": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-01T17:12:20.080Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p995-jmfv-c7r8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p995-jmfv-c7r8" }, { "name": "https://github.com/glpi-project/glpi/commit/58c67d78f2e3ad08264213e9aaf56eab3c9ded35", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/58c67d78f2e3ad08264213e9aaf56eab3c9ded35" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.12", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.12" } ], "source": { "advisory": "GHSA-p995-jmfv-c7r8", "discovery": "UNKNOWN" }, "title": "GLPI LDAP Injection during authentication" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-51446", "datePublished": "2024-02-01T15:25:01.465Z", "dateReserved": "2023-12-19T13:52:41.787Z", "dateUpdated": "2024-08-02T22:32:09.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39277
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Cross-Site Scripting (XSS) in external links in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rhcw-8r7g-8pwc" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.60, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. This issue has been patched, please upgrade to GLPI 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rhcw-8r7g-8pwc" }, { "url": "https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/" } ], "source": { "advisory": "GHSA-rhcw-8r7g-8pwc", "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting (XSS) in external links in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39277", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7507
Vulnerability from cvelistv5
Published
2017-07-19 13:00
Modified
2024-08-06 01:57
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to submit a request that could lead to the creation of an admin account in the application.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2483 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2483" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to submit a request that could lead to the creation of an admin account in the application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2483" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to submit a request that could lead to the creation of an admin account in the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2483", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2483" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7507", "datePublished": "2017-07-19T13:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14666
Vulnerability from cvelistv5
Published
2019-09-25 19:19
Modified
2024-08-05 00:19
Severity ?
EPSS score ?
Summary
GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.
References
▼ | URL | Tags |
---|---|---|
https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:19:41.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-26T11:49:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt", "refsource": "MISC", "url": "https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14666", "datePublished": "2019-09-25T19:19:15", "dateReserved": "2019-08-05T00:00:00", "dateUpdated": "2024-08-05T00:19:41.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2227
Vulnerability from cvelistv5
Published
2019-11-01 16:50
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
GLPI 0.83.7 has Local File Inclusion in common.tabs.php.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-2227 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2013-2227 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/06/30/10 | x_refsource_MISC | |
http://www.securityfocus.com/bid/60692 | x_refsource_MISC | |
https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
INDEPNET Development Team | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2227" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2013-2227" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/06/30/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60692" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "INDEPNET Development Team", "versions": [ { "status": "affected", "version": "0.83.7" } ] } ], "datePublic": "2013-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "GLPI 0.83.7 has Local File Inclusion in common.tabs.php." } ], "problemTypes": [ { "descriptions": [ { "description": "file inclusion", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T16:50:29", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2227" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2013-2227" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/06/30/10" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/60692" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2227", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "0.83.7" } ] } } ] }, "vendor_name": "INDEPNET Development Team" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI 0.83.7 has Local File Inclusion in common.tabs.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "file inclusion" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2013-2227", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2013-2227" }, { "name": "https://access.redhat.com/security/cve/cve-2013-2227", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2013-2227" }, { "name": "http://www.openwall.com/lists/oss-security/2013/06/30/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/06/30/10" }, { "name": "http://www.securityfocus.com/bid/60692", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/60692" }, { "name": "https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/122087/GLPI-0.83.7-Parameter-Traversal-Arbitrary-File-Access.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2227", "datePublished": "2019-11-01T16:50:29", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7508
Vulnerability from cvelistv5
Published
2017-06-21 20:00
Modified
2024-08-06 01:57
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/1047 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/42262/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/1047" }, { "name": "42262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42262/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-11T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/issues/1047" }, { "name": "42262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42262/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/1047", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/issues/1047" }, { "name": "42262", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42262/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7508", "datePublished": "2017-06-21T20:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27104
Vulnerability from cvelistv5
Published
2024-03-18 16:16
Modified
2024-08-26 14:00
Severity ?
EPSS score ?
Summary
Stored XSS in dashboards in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:27:59.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj" }, { "name": "https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.13", "status": "affected", "version": "9.5.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-27104", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-18T19:10:22.710585Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T14:00:56.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. A user with rights to create and share dashboards can build a dashboard containing javascript code. Any user that will open this dashboard will be subject to an XSS attack. This issue has been patched in version 10.0.13.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-18T16:16:38.709Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj" }, { "name": "https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-prc3-cx5m-h5mj", "discovery": "UNKNOWN" }, "title": "Stored XSS in dashboards in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27104", "datePublished": "2024-03-18T16:16:38.709Z", "dateReserved": "2024-02-19T14:43:05.994Z", "dateUpdated": "2024-08-26T14:00:56.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22725
Vulnerability from cvelistv5
Published
2023-01-25 05:50
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
glpi vulnerable to XSS on external links
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-f5g6-fxrw-pfj7 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f5g6-fxrw-pfj7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f5g6-fxrw-pfj7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e=0.60, \u003c 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions 0.6.0 and above, prior to 10.0.6 are vulnerable to Cross-site Scripting. This vulnerability allow for an administrator to create a malicious external link. This issue is patched in 10.0.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T05:50:19.071Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f5g6-fxrw-pfj7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-f5g6-fxrw-pfj7" } ], "source": { "advisory": "GHSA-f5g6-fxrw-pfj7", "discovery": "UNKNOWN" }, "title": "glpi vulnerable to XSS on external links" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22725", "datePublished": "2023-01-25T05:50:19.071Z", "dateReserved": "2023-01-06T14:21:05.890Z", "dateUpdated": "2024-08-02T10:13:50.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35947
Vulnerability from cvelistv5
Published
2022-09-14 17:50
Modified
2024-08-03 09:51
Severity ?
EPSS score ?
Summary
SQL injection in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.1, \u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T17:50:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962" } ], "source": { "advisory": "GHSA-7p3q-cffg-c8xh", "discovery": "UNKNOWN" }, "title": "SQL injection in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-35947", "STATE": "PUBLIC", "TITLE": "SQL injection in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.1, \u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh" }, { "name": "https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962" } ] }, "source": { "advisory": "GHSA-7p3q-cffg-c8xh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-35947", "datePublished": "2022-09-14T17:50:09", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:51:59.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39276
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Blind Server-Side Request Forgery (SSRF) in RSS feeds and planning
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p" }, { "url": "https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/" } ], "source": { "advisory": "GHSA-8vwg-7x42-7v6p", "discovery": "UNKNOWN" }, "title": "Blind Server-Side Request Forgery (SSRF) in RSS feeds and planning" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39276", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35940
Vulnerability from cvelistv5
Published
2023-07-05 20:46
Modified
2024-10-18 19:56
Severity ?
EPSS score ?
Summary
GLPI vulnerable to unauthenticated access to Dashboard data
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.8", "status": "affected", "version": "9.5.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-35940", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:55:06.753138Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:56:25.969Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T20:46:04.061Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-qrh8-rg45-45fw", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to unauthenticated access to Dashboard data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35940", "datePublished": "2023-07-05T20:46:04.061Z", "dateReserved": "2023-06-20T14:02:45.595Z", "dateUpdated": "2024-10-18T19:56:25.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43416
Vulnerability from cvelistv5
Published
2024-11-18 16:27
Modified
2024-11-18 18:34
Severity ?
EPSS score ?
Summary
GLPI vulnerable to enumeration of users' email addresses by unauthenticated user
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.17", "status": "affected", "version": "0.80", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43416", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T18:33:19.270940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T18:34:01.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.80, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:27:06.243Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7" }, { "name": "https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d" } ], "source": { "advisory": "GHSA-j8gc-xpgr-2ww7", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to enumeration of users\u0027 email addresses by unauthenticated user" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-43416", "datePublished": "2024-11-18T16:27:06.243Z", "dateReserved": "2024-08-12T18:02:04.967Z", "dateUpdated": "2024-11-18T18:34:01.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7563
Vulnerability from cvelistv5
Published
2018-03-12 21:00
Modified
2024-08-05 06:31
Severity ?
EPSS score ?
Summary
An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/pull/3647 | x_refsource_CONFIRM | |
https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/pull/3647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim\u0027s session token or login credentials, performing arbitrary actions on the victim\u0027s behalf, and logging their keystrokes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-12T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/pull/3647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim\u0027s session token or login credentials, performing arbitrary actions on the victim\u0027s behalf, and logging their keystrokes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/pull/3647", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/pull/3647" }, { "name": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/", "refsource": "MISC", "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7563", "datePublished": "2018-03-12T21:00:00", "dateReserved": "2018-02-28T00:00:00", "dateUpdated": "2024-08-05T06:31:04.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46726
Vulnerability from cvelistv5
Published
2023-12-13 18:25
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
GLPI Remote code execution from LDAP server configuration form on PHP 7.4
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.11 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95" }, { "name": "https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T18:25:06.408Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95" }, { "name": "https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "source": { "advisory": "GHSA-qc92-gxc6-5f95", "discovery": "UNKNOWN" }, "title": "GLPI Remote code execution from LDAP server configuration form on PHP 7.4" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-46726", "datePublished": "2023-12-13T18:25:06.408Z", "dateReserved": "2023-10-25T14:30:33.751Z", "dateUpdated": "2024-08-02T20:53:21.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39376
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Improper input validation on emails links in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6rh5-m5g7-327w" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6rh5-m5g7-327w" } ], "source": { "advisory": "GHSA-6rh5-m5g7-327w", "discovery": "UNKNOWN" }, "title": "Improper input validation on emails links in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39376", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4003
Vulnerability from cvelistv5
Published
2012-10-09 23:00
Modified
2024-08-06 20:21
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
https://forge.indepnet.net/issues/3705 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/07/13/1 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:132 | vendor-advisory, x_refsource_MANDRIVA | |
https://forge.indepnet.net/projects/glpi/versions/771 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:21:04.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/3705" }, { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "name": "MDVSA-2012:132", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/3705" }, { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "name": "MDVSA-2012:132", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forge.indepnet.net/issues/3705", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/3705" }, { "name": "[oss-security] 20120712 GLPI 0.83.2 CVE-2012-4002 CSRF and CVE-2012-4003 XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/07/13/1" }, { "name": "MDVSA-2012:132", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:132" }, { "name": "https://forge.indepnet.net/projects/glpi/versions/771", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/versions/771" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4003", "datePublished": "2012-10-09T23:00:00", "dateReserved": "2012-07-12T00:00:00", "dateUpdated": "2024-08-06T20:21:04.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8360
Vulnerability from cvelistv5
Published
2015-04-14 18:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.
References
▼ | URL | Tags |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=330 | x_refsource_CONFIRM | |
http://advisories.mageia.org/MGASA-2015-0017.html | x_refsource_CONFIRM | |
http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en | x_refsource_MISC | |
https://forge.indepnet.net/issues/5101 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=330" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/5101" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-14T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=330" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/5101" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2015:167", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=330", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=330" }, { "name": "http://advisories.mageia.org/MGASA-2015-0017.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "name": "http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en", "refsource": "MISC", "url": "http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en" }, { "name": "https://forge.indepnet.net/issues/5101", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/5101" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8360", "datePublished": "2015-04-14T18:00:00", "dateReserved": "2014-10-20T00:00:00", "dateUpdated": "2024-08-06T13:18:48.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11034
Vulnerability from cvelistv5
Published
2020-05-05 21:20
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
bypass of manageRedirect in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-185", "description": "CWE-185: Incorrect Regular Expression", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-15T04:06:22", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "source": { "advisory": "GHSA-gxv6-xq9q-37hg", "discovery": "UNKNOWN" }, "title": "bypass of manageRedirect in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11034", "STATE": "PUBLIC", "TITLE": "bypass of manageRedirect in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-185: Incorrect Regular Expression" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg" }, { "name": "FEDORA-2020-ee30e1109f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ] }, "source": { "advisory": "GHSA-gxv6-xq9q-37hg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11034", "datePublished": "2020-05-05T21:20:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15176
Vulnerability from cvelistv5
Published
2020-10-07 18:55
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
SQL injection in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.6.8, \u003c 9.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T18:55:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575" } ], "source": { "advisory": "GHSA-x93w-64x9-58qw", "discovery": "UNKNOWN" }, "title": "SQL injection in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15176", "STATE": "PUBLIC", "TITLE": "SQL injection in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 0.6.8, \u003c 9.5.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2" } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw" }, { "name": "https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575" } ] }, "source": { "advisory": "GHSA-x93w-64x9-58qw", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15176", "datePublished": "2020-10-07T18:55:12", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24876
Vulnerability from cvelistv5
Published
2022-06-09 18:50
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Stored cross site scrpting in GLPI's Kanban
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-09T18:50:25", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6" } ], "source": { "advisory": "GHSA-33g2-m556-gccr", "discovery": "UNKNOWN" }, "title": "Stored cross site scrpting in GLPI\u0027s Kanban", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24876", "STATE": "PUBLIC", "TITLE": "Stored cross site scrpting in GLPI\u0027s Kanban" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 10.0.1" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr" }, { "name": "https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6" } ] }, "source": { "advisory": "GHSA-33g2-m556-gccr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24876", "datePublished": "2022-06-09T18:50:25", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24869
Vulnerability from cvelistv5
Published
2022-04-21 17:00
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Cross Site Scripting in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e | x_refsource_MISC | |
https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.206Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.90, \u003c 10.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket\u0027s followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-21T17:00:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.0" } ], "source": { "advisory": "GHSA-p94c-8qp5-gfpx", "discovery": "UNKNOWN" }, "title": "Cross Site Scripting in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24869", "STATE": "PUBLIC", "TITLE": "Cross Site Scripting in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 0.90, \u003c 10.0.0" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket\u0027s followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx" }, { "name": "https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e" }, { "name": "https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.0", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.0" } ] }, "source": { "advisory": "GHSA-p94c-8qp5-gfpx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24869", "datePublished": "2022-04-21T17:00:16", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39234
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
user session persists even after permanently deleting account in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg" } ], "source": { "advisory": "GHSA-pgcx-mc58-3gmg", "discovery": "UNKNOWN" }, "title": "user session persists even after permanently deleting account in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39234", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11474
Vulnerability from cvelistv5
Published
2017-07-20 04:00
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2475 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:39.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2475" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-20T03:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2475" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2475", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2475" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11474", "datePublished": "2017-07-20T04:00:00", "dateReserved": "2017-07-19T00:00:00", "dateUpdated": "2024-08-05T18:12:39.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28838
Vulnerability from cvelistv5
Published
2023-04-05 17:39
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
GLPI vulnerable to SQL injection through dynamic reports
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.50, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance \u003e Statistics` and `Tools \u003e Reports` read rights from every user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T17:39:04.966Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-2c7r-gf38-358f", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to SQL injection through dynamic reports" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28838", "datePublished": "2023-04-05T17:39:04.966Z", "dateReserved": "2023-03-24T16:25:34.465Z", "dateUpdated": "2024-08-02T13:51:38.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11035
Vulnerability from cvelistv5
Published
2020-05-05 21:30
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
weak CSRF tokens in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e 0.83.3, \u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-15T04:06:21", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "source": { "advisory": "GHSA-w7q8-58qp-vmpf", "discovery": "UNKNOWN" }, "title": "weak CSRF tokens in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11035", "STATE": "PUBLIC", "TITLE": "weak CSRF tokens in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003e 0.83.3, \u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf" }, { "name": "FEDORA-2020-ee30e1109f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ] }, "source": { "advisory": "GHSA-w7q8-58qp-vmpf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11035", "datePublished": "2020-05-05T21:30:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45609
Vulnerability from cvelistv5
Published
2024-11-15 20:02
Modified
2024-11-15 21:11
Severity ?
EPSS score ?
Summary
GLPI has a Reflected XSS in /front/stat.graph.php
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-3j2f-3j4v-hppr | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45609", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T21:10:57.994967Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:11:16.977Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.70, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the reports pages. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T20:02:33.302Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3j2f-3j4v-hppr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3j2f-3j4v-hppr" } ], "source": { "advisory": "GHSA-3j2f-3j4v-hppr", "discovery": "UNKNOWN" }, "title": "GLPI has a Reflected XSS in /front/stat.graph.php" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45609", "datePublished": "2024-11-15T20:02:33.302Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-11-15T21:11:16.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11475
Vulnerability from cvelistv5
Published
2017-07-20 04:00
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2476 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:39.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2476" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-20T03:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2476" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2476", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2476" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11475", "datePublished": "2017-07-20T04:00:00", "dateReserved": "2017-07-19T00:00:00", "dateUpdated": "2024-08-05T18:12:39.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41678
Vulnerability from cvelistv5
Published
2024-11-15 18:08
Modified
2024-11-15 18:21
Severity ?
EPSS score ?
Summary
GLPI has multiple reflected XSS
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41678", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:21:35.425246Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:21:52.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.50, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:08:46.836Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9" } ], "source": { "advisory": "GHSA-xwmx-mmrf-hqf9", "discovery": "UNKNOWN" }, "title": "GLPI has multiple reflected XSS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41678", "datePublished": "2024-11-15T18:08:46.836Z", "dateReserved": "2024-07-18T15:21:47.487Z", "dateUpdated": "2024-11-15T18:21:52.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37149
Vulnerability from cvelistv5
Published
2024-07-10 19:20
Modified
2024-11-19 14:15
Severity ?
EPSS score ?
Summary
GLPI allows remote code execution through the plugin loader
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.16", "status": "affected", "version": "0.85", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37149", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T20:18:12.509282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T14:15:12.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:54.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.85, \u003c 10.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated technician user can upload a malicious PHP script and hijack the plugin loader to execute this malicious script. Upgrade to 10.0.16." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73: External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-10T19:20:36.161Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh" } ], "source": { "advisory": "GHSA-cwvp-j887-m4xh", "discovery": "UNKNOWN" }, "title": "GLPI allows remote code execution through the plugin loader" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37149", "datePublished": "2024-07-10T19:20:36.161Z", "dateReserved": "2024-06-03T17:29:38.328Z", "dateUpdated": "2024-11-19T14:15:12.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31061
Vulnerability from cvelistv5
Published
2022-06-28 17:55
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
SQL injection on login page in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.3.0, \u003c 9.5.8" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T17:55:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514" } ], "source": { "advisory": "GHSA-w2gc-v2gm-q7wq", "discovery": "UNKNOWN" }, "title": "SQL injection on login page in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31061", "STATE": "PUBLIC", "TITLE": "SQL injection on login page in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.3.0, \u003c 9.5.8" }, { "version_value": "\u003e= 10.0.0, \u003c 10.0.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq" }, { "name": "https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514" } ] }, "source": { "advisory": "GHSA-w2gc-v2gm-q7wq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31061", "datePublished": "2022-06-28T17:55:11", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39370
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Improper access to debug panel in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6c2p-wgx9-vrjc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.70, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6c2p-wgx9-vrjc" } ], "source": { "advisory": "GHSA-6c2p-wgx9-vrjc", "discovery": "UNKNOWN" }, "title": "Improper access to debug panel in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39370", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28639
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
GLPI vulnerable to reflected Cross-site Scripting in search pages
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" }, { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi", "versions": [ { "lessThan": "0.85*", "status": "affected", "version": "0.85", "versionType": "custom" }, { "lessThan": "9.5.13", "status": "affected", "version": "9.5.13", "versionType": "custom" }, { "lessThan": "10.0.0*", "status": "affected", "version": "10.0.0", "versionType": "custom" }, { "lessThan": "10.0.7", "status": "affected", "version": "10.0.7", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4" } ], "source": { "advisory": "GHSA-r93q-chh5-jgh4", "defect": [ "GHSA-r93q-chh5-jgh4" ], "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to reflected Cross-site Scripting in search pages", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28639", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2023-03-20T00:00:00", "dateUpdated": "2024-08-02T13:43:23.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39373
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting (XSS) in entity name in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cw37-q82c-w546" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cw37-q82c-w546" } ], "source": { "advisory": "GHSA-cw37-q82c-w546", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting (XSS) in entity name in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39373", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11032
Vulnerability from cvelistv5
Published
2020-05-05 21:05
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
SQL injection on addme_observer and addme_assign in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-05T21:05:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh" } ], "source": { "advisory": "GHSA-344w-34h9-wwhh", "discovery": "UNKNOWN" }, "title": "SQL injection on addme_observer and addme_assign in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11032", "STATE": "PUBLIC", "TITLE": "SQL injection on addme_observer and addme_assign in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh" } ] }, "source": { "advisory": "GHSA-344w-34h9-wwhh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11032", "datePublished": "2020-05-05T21:05:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21258
Vulnerability from cvelistv5
Published
2021-03-02 19:45
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
XSS injection in ajax/kanban
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:14.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI from version 9.5.0 and before version 9.5.4, there is a cross-site scripting injection vulnerability when using ajax/kanban.php. This is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-02T19:45:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15" } ], "source": { "advisory": "GHSA-j4xj-4qmc-mmmx", "discovery": "UNKNOWN" }, "title": "XSS injection in ajax/kanban", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21258", "STATE": "PUBLIC", "TITLE": "XSS injection in ajax/kanban" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.5.0, \u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI from version 9.5.0 and before version 9.5.4, there is a cross-site scripting injection vulnerability when using ajax/kanban.php. This is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j4xj-4qmc-mmmx" }, { "name": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/e7802fc051696de1f76108ea8dc3bd4e2c880f15" } ] }, "source": { "advisory": "GHSA-j4xj-4qmc-mmmx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21258", "datePublished": "2021-03-02T19:45:17", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:14.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21313
Vulnerability from cvelistv5
Published
2021-03-03 19:25
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
XSS on tabs
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not properly sanitized. Here are two payloads (due to two different exploitations depending on which parameter you act) to exploit the vulnerability:/ajax/common.tabs.php?_target=javascript:alert(document.cookie)\u0026_itemtype=DisplayPreference\u0026_glpi_tab=DisplayPreference$2\u0026id=258\u0026displaytype=Ticket (Payload triggered if you click on the button). /ajax/common.tabs.php?_target=/front/ticket.form.php\u0026_itemtype=Ticket\u0026_glpi_tab=Ticket$1\u0026id=(){};(function%20(){alert(document.cookie);})();function%20a\u0026#." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-03T19:25:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" } ], "source": { "advisory": "GHSA-h4hj-mrpg-xfgx", "discovery": "UNKNOWN" }, "title": "XSS on tabs", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21313", "STATE": "PUBLIC", "TITLE": "XSS on tabs" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not properly sanitized. Here are two payloads (due to two different exploitations depending on which parameter you act) to exploit the vulnerability:/ajax/common.tabs.php?_target=javascript:alert(document.cookie)\u0026_itemtype=DisplayPreference\u0026_glpi_tab=DisplayPreference$2\u0026id=258\u0026displaytype=Ticket (Payload triggered if you click on the button). /ajax/common.tabs.php?_target=/front/ticket.form.php\u0026_itemtype=Ticket\u0026_glpi_tab=Ticket$1\u0026id=(){};(function%20(){alert(document.cookie);})();function%20a\u0026#." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-h4hj-mrpg-xfgx" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" } ] }, "source": { "advisory": "GHSA-h4hj-mrpg-xfgx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21313", "datePublished": "2021-03-03T19:25:13", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35945
Vulnerability from cvelistv5
Published
2022-09-14 17:45
Modified
2024-08-03 09:51
Severity ?
EPSS score ?
Summary
Cross site scripting (XSS) via registration API in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T17:45:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a" } ], "source": { "advisory": "GHSA-jrgw-cx24-56x5", "discovery": "UNKNOWN" }, "title": "Cross site scripting (XSS) via registration API in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-35945", "STATE": "PUBLIC", "TITLE": "Cross site scripting (XSS) via registration API in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.5.0, \u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5" }, { "name": "https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a" } ] }, "source": { "advisory": "GHSA-jrgw-cx24-56x5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-35945", "datePublished": "2022-09-14T17:45:12", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:51:59.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39372
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting (XSS) in user information in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.70, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2" } ], "source": { "advisory": "GHSA-5rj7-95qc-89h2", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting (XSS) in user information in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39372", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15108
Vulnerability from cvelistv5
Published
2020-07-17 20:30
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
SQL Injection in glpi
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/pull/6684 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/pull/6684" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "In glpi before 9.5.1, there is a SQL injection for all usages of \"Clone\" feature. This has been fixed in 9.5.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-17T20:30:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/pull/6684" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba" } ], "source": { "advisory": "GHSA-qv6w-68gq-wx2v", "discovery": "UNKNOWN" }, "title": "SQL Injection in glpi", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15108", "STATE": "PUBLIC", "TITLE": "SQL Injection in glpi" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.1" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In glpi before 9.5.1, there is a SQL injection for all usages of \"Clone\" feature. This has been fixed in 9.5.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v" }, { "name": "https://github.com/glpi-project/glpi/pull/6684", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/pull/6684" }, { "name": "https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba" } ] }, "source": { "advisory": "GHSA-qv6w-68gq-wx2v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15108", "datePublished": "2020-07-17T20:30:17", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42461
Vulnerability from cvelistv5
Published
2023-09-26 22:45
Modified
2024-09-23 19:32
Severity ?
EPSS score ?
Summary
SQL injection in ITIL actors in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:23:39.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.10", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-42461", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T18:54:11.659312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T19:32:26.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:45:26.071Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84w" } ], "source": { "advisory": "GHSA-x3jp-69f2-p84w", "discovery": "UNKNOWN" }, "title": "SQL injection in ITIL actors in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-42461", "datePublished": "2023-09-26T22:45:26.071Z", "dateReserved": "2023-09-08T20:57:45.574Z", "dateUpdated": "2024-09-23T19:32:26.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7684
Vulnerability from cvelistv5
Published
2015-10-05 14:00
Modified
2024-08-06 07:58
Severity ?
EPSS score ?
Summary
Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Feb/71 | mailing-list, x_refsource_FULLDISC | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=338 | x_refsource_CONFIRM | |
https://forge.glpi-project.org/issues/5217 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.glpi-project.org/issues/5217" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-05T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.glpi-project.org/issues/5217" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" }, { "name": "https://forge.glpi-project.org/issues/5217", "refsource": "CONFIRM", "url": "https://forge.glpi-project.org/issues/5217" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7684", "datePublished": "2015-10-05T14:00:00", "dateReserved": "2015-10-02T00:00:00", "dateUpdated": "2024-08-06T07:58:59.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35946
Vulnerability from cvelistv5
Published
2022-09-14 17:55
Modified
2024-08-03 09:51
Severity ?
EPSS score ?
Summary
SQL injection through plugin controller in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.72, \u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have \"General setup\" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T17:55:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8" } ], "source": { "advisory": "GHSA-92q5-pfr8-r9r2", "discovery": "UNKNOWN" }, "title": "SQL injection through plugin controller in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-35946", "STATE": "PUBLIC", "TITLE": "SQL injection through plugin controller in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 0.72, \u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have \"General setup\" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2" }, { "name": "https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8" } ] }, "source": { "advisory": "GHSA-92q5-pfr8-r9r2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-35946", "datePublished": "2022-09-14T17:55:09", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:51:59.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47759
Vulnerability from cvelistv5
Published
2024-11-15 17:42
Modified
2024-11-21 14:55
Severity ?
EPSS score ?
Summary
GLPI has a stored XSS via document upload
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-474f-9vpp-xxq5 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47759", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:10:24.440843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T14:55:31.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.2.0, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free Asset and IT management software package. An technician can upload a SVG containing a malicious script. The script will then be executed when any user will try to see the document contents. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.7, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:42:00.532Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-474f-9vpp-xxq5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-474f-9vpp-xxq5" } ], "source": { "advisory": "GHSA-474f-9vpp-xxq5", "discovery": "UNKNOWN" }, "title": "GLPI has a stored XSS via document upload" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47759", "datePublished": "2024-11-15T17:42:00.532Z", "dateReserved": "2024-09-30T21:28:53.230Z", "dateUpdated": "2024-11-21T14:55:31.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9258
Vulnerability from cvelistv5
Published
2014-12-19 15:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html | vendor-advisory, x_refsource_FEDORA | |
http://www.exploit-db.com/exploits/35528 | exploit, x_refsource_EXPLOIT-DB | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 | vendor-advisory, x_refsource_MANDRIVA | |
http://security.szurek.pl/glpi-085-blind-sql-injection.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/61367 | third-party-advisory, x_refsource_SECUNIA | |
http://advisories.mageia.org/MGASA-2015-0017.html | x_refsource_CONFIRM | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=334&lang=en | x_refsource_CONFIRM | |
http://osvdb.org/show/osvdb/115957 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2014-17520", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html" }, { "name": "35528", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/35528" }, { "name": "FEDORA-2014-17508", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html" }, { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.szurek.pl/glpi-085-blind-sql-injection.html" }, { "name": "FEDORA-2014-17497", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html" }, { "name": "61367", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61367" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=334\u0026lang=en" }, { "name": "115957", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/115957" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-16T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2014-17520", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html" }, { "name": "35528", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/35528" }, { "name": "FEDORA-2014-17508", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html" }, { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.szurek.pl/glpi-085-blind-sql-injection.html" }, { "name": "FEDORA-2014-17497", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html" }, { "name": "61367", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61367" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=334\u0026lang=en" }, { "name": "115957", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/show/osvdb/115957" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2014-17520", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html" }, { "name": "35528", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/35528" }, { "name": "FEDORA-2014-17508", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html" }, { "name": "MDVSA-2015:167", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "name": "http://security.szurek.pl/glpi-085-blind-sql-injection.html", "refsource": "MISC", "url": "http://security.szurek.pl/glpi-085-blind-sql-injection.html" }, { "name": "FEDORA-2014-17497", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html" }, { "name": "61367", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61367" }, { "name": "http://advisories.mageia.org/MGASA-2015-0017.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=334\u0026lang=en", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=334\u0026lang=en" }, { "name": "115957", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/115957" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9258", "datePublished": "2014-12-19T15:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31056
Vulnerability from cvelistv5
Published
2022-06-28 00:00
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
SQL injection with _actor parameter in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg" }, { "url": "http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html" } ], "source": { "advisory": "GHSA-9q9x-7xxh-w4cg", "discovery": "UNKNOWN" }, "title": "SQL injection with _actor parameter in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31056", "datePublished": "2022-06-28T00:00:00", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2225
Vulnerability from cvelistv5
Published
2014-05-27 15:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php.
References
▼ | URL | Tags |
---|---|---|
https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff | x_refsource_CONFIRM | |
http://osvdb.org/94683 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/60823 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2013/q2/626 | mailing-list, x_refsource_MLIST | |
http://seclists.org/oss-sec/2013/q2/645 | mailing-list, x_refsource_MLIST | |
http://www.exploit-db.com/exploits/26530 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff" }, { "name": "94683", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/94683" }, { "name": "60823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60823" }, { "name": "[oss-security] 20130627 CVE request for GLPI", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q2/626" }, { "name": "[oss-security] 20130630 Re: CVE request for GLPI", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q2/645" }, { "name": "26530", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/26530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-27T00:00:00", "descriptions": [ { "lang": "en", "value": "inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-27T14:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff" }, { "name": "94683", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/94683" }, { "name": "60823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60823" }, { "name": "[oss-security] 20130627 CVE request for GLPI", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q2/626" }, { "name": "[oss-security] 20130630 Re: CVE request for GLPI", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q2/645" }, { "name": "26530", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/26530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff" }, { "name": "94683", "refsource": "OSVDB", "url": "http://osvdb.org/94683" }, { "name": "60823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60823" }, { "name": "[oss-security] 20130627 CVE request for GLPI", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q2/626" }, { "name": "[oss-security] 20130630 Re: CVE request for GLPI", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q2/645" }, { "name": "26530", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/26530" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2225", "datePublished": "2014-05-27T15:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21312
Vulnerability from cvelistv5
Published
2021-03-03 19:25
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Stored XSS on documents
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:14.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home \u003e Management \u003e Documents \u003e Add, or /front/document.form.php endpoint), indeed one of the form field: \"Web Link\" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: \" accesskey=\"x\" onclick=\"alert(1)\" x=\", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the \"Web Link\" of the newly created file it will create a new empty tab, but on the initial tab the pop-up \"1\" will appear." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-03T19:25:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" } ], "source": { "advisory": "GHSA-c7f6-3mr7-3rq2", "discovery": "UNKNOWN" }, "title": "Stored XSS on documents", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21312", "STATE": "PUBLIC", "TITLE": "Stored XSS on documents" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home \u003e Management \u003e Documents \u003e Add, or /front/document.form.php endpoint), indeed one of the form field: \"Web Link\" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: \" accesskey=\"x\" onclick=\"alert(1)\" x=\", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the \"Web Link\" of the newly created file it will create a new empty tab, but on the initial tab the pop-up \"1\" will appear." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2" } ] }, "source": { "advisory": "GHSA-c7f6-3mr7-3rq2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21312", "datePublished": "2021-03-03T19:25:20", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:14.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39209
Vulnerability from cvelistv5
Published
2021-09-15 15:50
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Bypassable CSRF protection
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/9.5.6 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T15:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" } ], "source": { "advisory": "GHSA-5qpf-32w7-c56p", "discovery": "UNKNOWN" }, "title": "Bypassable CSRF protection", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39209", "STATE": "PUBLIC", "TITLE": "Bypassable CSRF protection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352: Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-5qpf-32w7-c56p" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" } ] }, "source": { "advisory": "GHSA-5qpf-32w7-c56p", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39209", "datePublished": "2021-09-15T15:50:10", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-10477
Vulnerability from cvelistv5
Published
2019-03-29 13:07
Modified
2024-08-04 22:24
Severity ?
EPSS score ?
Summary
The FusionInventory plugin before 1.4 for GLPI 9.3.x and before 1.1 for GLPI 9.4.x mishandles sendXML actions.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:24:18.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.4%2B1.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.3%2B1.4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/commit/0f777f85773b18f5252e79afa1929fcdc4858c3a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/cec774a...baa4158" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/260a864...e1f776d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The FusionInventory plugin before 1.4 for GLPI 9.3.x and before 1.1 for GLPI 9.4.x mishandles sendXML actions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-29T13:07:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.4%2B1.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.3%2B1.4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/commit/0f777f85773b18f5252e79afa1929fcdc4858c3a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/cec774a...baa4158" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/260a864...e1f776d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-10477", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FusionInventory plugin before 1.4 for GLPI 9.3.x and before 1.1 for GLPI 9.4.x mishandles sendXML actions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.4%2B1.1", "refsource": "MISC", "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.4%2B1.1" }, { "name": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.3%2B1.4", "refsource": "MISC", "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/releases/tag/glpi9.3%2B1.4" }, { "name": "https://github.com/fusioninventory/fusioninventory-for-glpi/commit/0f777f85773b18f5252e79afa1929fcdc4858c3a", "refsource": "MISC", "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/commit/0f777f85773b18f5252e79afa1929fcdc4858c3a" }, { "name": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/cec774a...baa4158", "refsource": "MISC", "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/cec774a...baa4158" }, { "name": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/260a864...e1f776d", "refsource": "MISC", "url": "https://github.com/fusioninventory/fusioninventory-for-glpi/compare/260a864...e1f776d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-10477", "datePublished": "2019-03-29T13:07:23", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:24:18.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39210
Vulnerability from cvelistv5
Published
2021-09-15 16:40
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Autologin cookie accessible by scripts
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.6 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2 | x_refsource_CONFIRM | |
https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the \"remember me\" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the \"remember me\" feature." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1004", "description": "CWE-1004: Sensitive Cookie Without \u0027HttpOnly\u0027 Flag", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T16:40:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/" } ], "source": { "advisory": "GHSA-hwxq-4c5f-m4v2", "discovery": "UNKNOWN" }, "title": "Autologin cookie accessible by scripts", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39210", "STATE": "PUBLIC", "TITLE": "Autologin cookie accessible by scripts" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the \"remember me\" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the \"remember me\" feature." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1004: Sensitive Cookie Without \u0027HttpOnly\u0027 Flag" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.6" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2" }, { "name": "https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/", "refsource": "MISC", "url": "https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/" } ] }, "source": { "advisory": "GHSA-hwxq-4c5f-m4v2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39210", "datePublished": "2021-09-15T16:40:11", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1037
Vulnerability from cvelistv5
Published
2012-07-12 20:00
Modified
2024-09-17 02:58
Severity ?
EPSS score ?
Summary
PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter.
References
▼ | URL | Tags |
---|---|---|
https://forge.indepnet.net/projects/glpi/versions/685 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:016 | vendor-advisory, x_refsource_MANDRIVA | |
http://seclists.org/fulldisclosure/2012/Feb/157 | mailing-list, x_refsource_FULLDISC | |
https://forge.indepnet.net/issues/3338 | x_refsource_CONFIRM | |
https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:27.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/versions/685" }, { "name": "MDVSA-2012:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016" }, { "name": "20120210 CVE-2012-1037: GLPI \u003c= 0.80.61 LFI/RFI", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2012/Feb/157" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/3338" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-12T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/versions/685" }, { "name": "MDVSA-2012:016", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016" }, { "name": "20120210 CVE-2012-1037: GLPI \u003c= 0.80.61 LFI/RFI", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2012/Feb/157" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/3338" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forge.indepnet.net/projects/glpi/versions/685", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/versions/685" }, { "name": "MDVSA-2012:016", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016" }, { "name": "20120210 CVE-2012-1037: GLPI \u003c= 0.80.61 LFI/RFI", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2012/Feb/157" }, { "name": "https://forge.indepnet.net/issues/3338", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/3338" }, { "name": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1037", "datePublished": "2012-07-12T20:00:00Z", "dateReserved": "2012-02-08T00:00:00Z", "dateUpdated": "2024-09-17T02:58:10.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31187
Vulnerability from cvelistv5
Published
2022-09-14 18:00
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Stored Cross Site Scripting (XSS) through global search in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T18:00:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb" } ], "source": { "advisory": "GHSA-43j5-xhvj-9236", "discovery": "UNKNOWN" }, "title": "Stored Cross Site Scripting (XSS) through global search in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31187", "STATE": "PUBLIC", "TITLE": "Stored Cross Site Scripting (XSS) through global search in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 10.0.0, \u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236" }, { "name": "https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb" } ] }, "source": { "advisory": "GHSA-43j5-xhvj-9236", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31187", "datePublished": "2022-09-14T18:00:15", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15177
Vulnerability from cvelistv5
Published
2020-10-07 19:05
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Unauthenticated Stored XSS in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 9.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it\u0027s possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T19:05:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796" } ], "source": { "advisory": "GHSA-prvh-9m4h-4m79", "discovery": "UNKNOWN" }, "title": "Unauthenticated Stored XSS in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15177", "STATE": "PUBLIC", "TITLE": "Unauthenticated Stored XSS in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 0.65, \u003c 9.5.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it\u0027s possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79" }, { "name": "https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796" } ] }, "source": { "advisory": "GHSA-prvh-9m4h-4m79", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15177", "datePublished": "2020-10-07T19:05:14", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36112
Vulnerability from cvelistv5
Published
2022-09-14 17:45
Modified
2024-08-03 09:52
Severity ?
EPSS score ?
Summary
Blind Server-Side Request Forgery (SSRF) in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:52:00.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T17:45:18", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e" } ], "source": { "advisory": "GHSA-rqgx-gqhp-x8vv", "discovery": "UNKNOWN" }, "title": "Blind Server-Side Request Forgery (SSRF) in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36112", "STATE": "PUBLIC", "TITLE": "Blind Server-Side Request Forgery (SSRF) in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 10.0.3" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv" }, { "name": "https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e" } ] }, "source": { "advisory": "GHSA-rqgx-gqhp-x8vv", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36112", "datePublished": "2022-09-14T17:45:18", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:52:00.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7685
Vulnerability from cvelistv5
Published
2015-10-05 14:00
Modified
2024-08-06 07:58
Severity ?
EPSS score ?
Summary
GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php.
References
▼ | URL | Tags |
---|---|---|
https://forge.glpi-project.org/issues/5218 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2015/Feb/71 | mailing-list, x_refsource_FULLDISC | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=338 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.glpi-project.org/issues/5218" }, { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-05T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.glpi-project.org/issues/5218" }, { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7685", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://forge.glpi-project.org/issues/5218", "refsource": "CONFIRM", "url": "https://forge.glpi-project.org/issues/5218" }, { "name": "20150217 [CVE-REQUEST] Multiple vulnerabilities on GLPI", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Feb/71" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7685", "datePublished": "2015-10-05T14:00:00", "dateReserved": "2015-10-02T00:00:00", "dateUpdated": "2024-08-06T07:58:59.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2226
Vulnerability from cvelistv5
Published
2014-05-14 19:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/60693 | vdb-entry, x_refsource_BID | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves= | x_refsource_MISC | |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60693", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60693" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=297\u0026lang=en\u0026debut_autres_breves=" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-14T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60693", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60693" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=297\u0026lang=en\u0026debut_autres_breves=" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60693", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60693" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=297\u0026lang=en\u0026debut_autres_breves=", "refsource": "MISC", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=297\u0026lang=en\u0026debut_autres_breves=" }, { "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php", "refsource": "MISC", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2226", "datePublished": "2014-05-14T19:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27930
Vulnerability from cvelistv5
Published
2024-03-18 15:29
Modified
2024-08-02 15:26
Severity ?
EPSS score ?
Summary
Sensitive fields access through dropdowns in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e | x_refsource_MISC | |
https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.952Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq" }, { "name": "https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e" }, { "name": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-27930", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T15:26:15.476816Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T15:26:25.744Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.78, \u003c 10.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An authenticated user can access sensitive fields data from items on which he has read access. This issue has been patched in version 10.0.13." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-24T14:39:50.719Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq" }, { "name": "https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e" }, { "name": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", "tags": [ "x_refsource_MISC" ], "url": "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.13" } ], "source": { "advisory": "GHSA-82vv-j9pr-qmwq", "discovery": "UNKNOWN" }, "title": "Sensitive fields access through dropdowns in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27930", "datePublished": "2024-03-18T15:29:11.382Z", "dateReserved": "2024-02-28T15:14:14.216Z", "dateUpdated": "2024-08-02T15:26:25.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7509
Vulnerability from cvelistv5
Published
2017-07-19 13:00
Modified
2024-08-06 01:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to inject arbitrary web script or HTML by attaching a crafted HTML file to a ticket.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2483 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2483" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to inject arbitrary web script or HTML by attaching a crafted HTML file to a ticket." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2483" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7509", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to inject arbitrary web script or HTML by attaching a crafted HTML file to a ticket." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2483", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2483" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7509", "datePublished": "2017-07-19T13:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41324
Vulnerability from cvelistv5
Published
2023-09-26 22:37
Modified
2024-09-23 20:16
Severity ?
EPSS score ?
Summary
Account takeover through API in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:34.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41324", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:16:05.634761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:16:20.318Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.3.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that have read access on users resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T22:37:35.982Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-58wj-8jhx-jpm3" } ], "source": { "advisory": "GHSA-58wj-8jhx-jpm3", "discovery": "UNKNOWN" }, "title": "Account takeover through API in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41324", "datePublished": "2023-09-26T22:37:35.982Z", "dateReserved": "2023-08-28T16:56:43.366Z", "dateUpdated": "2024-09-23T20:16:20.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39375
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Cross-Site Scripting (XSS) through public RSS feed in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-fxcx-93fq-8r9g" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.84, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-fxcx-93fq-8r9g" } ], "source": { "advisory": "GHSA-fxcx-93fq-8r9g", "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting (XSS) through public RSS feed in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39375", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5032
Vulnerability from cvelistv5
Published
2015-04-14 18:00
Modified
2024-08-06 11:34
Severity ?
EPSS score ?
Summary
GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.
References
▼ | URL | Tags |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.glpi-project.org/spip.php?page=annonce&id_breve=325 | x_refsource_CONFIRM | |
http://advisories.mageia.org/MGASA-2015-0017.html | x_refsource_CONFIRM | |
https://forge.indepnet.net/issues/4984 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:34:37.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/4984" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-27T00:00:00", "descriptions": [ { "lang": "en", "value": "GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-14T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2015:167", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/4984" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2015:167", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167" }, { "name": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=325", "refsource": "CONFIRM", "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=325" }, { "name": "http://advisories.mageia.org/MGASA-2015-0017.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0017.html" }, { "name": "https://forge.indepnet.net/issues/4984", "refsource": "CONFIRM", "url": "https://forge.indepnet.net/issues/4984" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5032", "datePublished": "2015-04-14T18:00:00", "dateReserved": "2014-07-22T00:00:00", "dateUpdated": "2024-08-06T11:34:37.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38370
Vulnerability from cvelistv5
Published
2024-11-15 21:12
Modified
2024-11-18 19:02
Severity ?
EPSS score ?
Summary
GLPI allows API document download without rights
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.16", "status": "affected", "version": "9.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38370", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T19:02:10.532885Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T19:02:59.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.2.0, \u003c 10.0.16" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in 9.2.0 and prior to 11.0.0, it is possible to download a document from the API without appropriate rights. Upgrade to 10.0.16." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:12:56.606Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4" } ], "source": { "advisory": "GHSA-xrm2-m72w-w4x4", "discovery": "UNKNOWN" }, "title": "GLPI allows API document download without rights" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-38370", "datePublished": "2024-11-15T21:12:56.606Z", "dateReserved": "2024-06-14T14:16:16.466Z", "dateUpdated": "2024-11-18T19:02:59.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11033
Vulnerability from cvelistv5
Published
2020-05-05 21:15
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Able to read any token through API user endpoint in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | GLPI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GLPI", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e9.1, \u003c 9.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-15T04:06:23", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55" }, { "name": "FEDORA-2020-ee30e1109f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ], "source": { "advisory": "GHSA-rf54-3r4w-4h55", "discovery": "UNKNOWN" }, "title": "Able to read any token through API user endpoint in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11033", "STATE": "PUBLIC", "TITLE": "Able to read any token through API user endpoint in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GLPI", "version": { "version_data": [ { "version_value": "\u003e9.1, \u003c 9.4.6" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55" }, { "name": "FEDORA-2020-ee30e1109f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/" }, { "name": "FEDORA-2020-885e2343ed", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/" } ] }, "source": { "advisory": "GHSA-rf54-3r4w-4h55", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11033", "datePublished": "2020-05-05T21:15:12", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21314
Vulnerability from cvelistv5
Published
2021-03-03 19:30
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
XSS injection on ticket update
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-03T19:30:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" } ], "source": { "advisory": "GHSA-2w7j-xgj7-3xgg", "discovery": "UNKNOWN" }, "title": "XSS injection on ticket update", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21314", "STATE": "PUBLIC", "TITLE": "XSS injection on ticket update" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2w7j-xgj7-3xgg" } ] }, "source": { "advisory": "GHSA-2w7j-xgj7-3xgg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21314", "datePublished": "2021-03-03T19:30:15", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39262
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting (XSS) on login page in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4x48-q2wr-cpg4" }, { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-83", "description": "CWE-83: Improper Neutralization of Script in Attributes in a Web Page", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-4x48-q2wr-cpg4" }, { "url": "https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/" } ], "source": { "advisory": "GHSA-4x48-q2wr-cpg4", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting (XSS) on login page in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39262", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43418
Vulnerability from cvelistv5
Published
2024-11-15 18:23
Modified
2024-11-15 18:41
Severity ?
EPSS score ?
Summary
GLPI has multiple reflected XSS
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-x8jv-fcwx-3x6m | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43418", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:40:57.475801Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:41:14.709Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:23:32.376Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x8jv-fcwx-3x6m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-x8jv-fcwx-3x6m" } ], "source": { "advisory": "GHSA-x8jv-fcwx-3x6m", "discovery": "UNKNOWN" }, "title": "GLPI has multiple reflected XSS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-43418", "datePublished": "2024-11-15T18:23:32.376Z", "dateReserved": "2024-08-12T18:02:04.967Z", "dateUpdated": "2024-11-15T18:41:14.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44617
Vulnerability from cvelistv5
Published
2022-03-28 01:08
Modified
2024-08-04 04:25
Severity ?
EPSS score ?
Summary
A SQL Injection vulnerability exits in the Ramo plugin for GLPI 9.4.6 via the idu parameter in plugins/ramo/ramoapirest.php/getOutdated.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:25:16.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability exits in the Ramo plugin for GLPI 9.4.6 via the idu parameter in plugins/ramo/ramoapirest.php/getOutdated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-28T01:08:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-44617", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A SQL Injection vulnerability exits in the Ramo plugin for GLPI 9.4.6 via the idu parameter in plugins/ramo/ramoapirest.php/getOutdated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44617", "datePublished": "2022-03-28T01:08:13", "dateReserved": "2021-12-06T00:00:00", "dateUpdated": "2024-08-04T04:25:16.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34107
Vulnerability from cvelistv5
Published
2023-07-05 19:15
Modified
2024-10-24 17:59
Severity ?
EPSS score ?
Summary
GLPI vulnerable to unauthorized access to KnowbaseItem data
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34107", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T17:59:47.595441Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-24T17:59:56.346Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.2.0, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T19:15:31.060Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-966h-xrf5-pmj4", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to unauthorized access to KnowbaseItem data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34107", "datePublished": "2023-07-05T19:15:31.060Z", "dateReserved": "2023-05-25T21:56:51.246Z", "dateUpdated": "2024-10-24T17:59:56.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28852
Vulnerability from cvelistv5
Published
2023-04-05 17:45
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
GLPI vulnerable to stored Cross-site Scripting through dashboard administration
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 9.5.13" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T17:45:30.721Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.7" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.13" } ], "source": { "advisory": "GHSA-65gq-p8hg-7m92", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to stored Cross-site Scripting through dashboard administration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28852", "datePublished": "2023-04-05T17:45:30.721Z", "dateReserved": "2023-03-24T16:25:34.467Z", "dateUpdated": "2024-08-02T13:51:38.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46727
Vulnerability from cvelistv5
Published
2023-12-13 18:26
Modified
2024-11-19 14:17
Severity ?
EPSS score ?
Summary
GLPI SQL injection through inventory agent request
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.11 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr" }, { "name": "https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.11", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46727", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T14:16:33.648059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T14:17:31.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, GLPI inventory endpoint can be used to drive a SQL injection attack. Version 10.0.11 contains a patch for the issue. As a workaround, disable native inventory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T18:26:35.980Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr" }, { "name": "https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.11", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.11" } ], "source": { "advisory": "GHSA-v799-2mp3-wgfr", "discovery": "UNKNOWN" }, "title": "GLPI SQL injection through inventory agent request" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-46727", "datePublished": "2023-12-13T18:26:35.980Z", "dateReserved": "2023-10-25T14:30:33.751Z", "dateUpdated": "2024-11-19T14:17:31.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13239
Vulnerability from cvelistv5
Published
2019-07-04 14:22
Modified
2024-08-04 23:49
Severity ?
EPSS score ?
Summary
inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.4.3 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb | x_refsource_MISC | |
https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:23.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-05T17:25:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13239", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.4.3", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.3" }, { "name": "https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb" }, { "name": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf", "refsource": "MISC", "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13239", "datePublished": "2019-07-04T14:22:55", "dateReserved": "2019-07-04T00:00:00", "dateUpdated": "2024-08-04T23:49:23.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39371
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Stored Cross-Site Scripting (XSS) through asset inventory in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7wc-728f-6mm8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Script related HTML tags in assets inventory information are not properly neutralized. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-w7wc-728f-6mm8" } ], "source": { "advisory": "GHSA-w7wc-728f-6mm8", "discovery": "UNKNOWN" }, "title": "Stored Cross-Site Scripting (XSS) through asset inventory in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39371", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45610
Vulnerability from cvelistv5
Published
2024-11-15 20:14
Modified
2024-11-15 21:10
Severity ?
EPSS score ?
Summary
GLPI has a reflected XSS in ajax/cable.php
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-vvr8-chwj-9m4c | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45610", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T21:10:20.262720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:10:37.523Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.17" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Cable form. Upgrade to 10.0.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T20:14:33.893Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vvr8-chwj-9m4c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vvr8-chwj-9m4c" } ], "source": { "advisory": "GHSA-vvr8-chwj-9m4c", "discovery": "UNKNOWN" }, "title": "GLPI has a reflected XSS in ajax/cable.php" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45610", "datePublished": "2024-11-15T20:14:33.893Z", "dateReserved": "2024-09-02T16:00:02.425Z", "dateUpdated": "2024-11-15T21:10:37.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22722
Vulnerability from cvelistv5
Published
2023-01-25 05:58
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
glpi subject to Cross-site Scripting (XSS) - Reflected
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:50.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.4.0, \u003c 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T05:58:01.087Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c" } ], "source": { "advisory": "GHSA-352j-wr38-493c", "discovery": "UNKNOWN" }, "title": "glpi subject to Cross-site Scripting (XSS) - Reflected " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22722", "datePublished": "2023-01-25T05:58:01.087Z", "dateReserved": "2023-01-06T14:21:05.889Z", "dateUpdated": "2024-08-02T10:13:50.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35924
Vulnerability from cvelistv5
Published
2023-07-05 19:35
Modified
2024-10-18 19:58
Severity ?
EPSS score ?
Summary
GLPI vulnerable to SQL injection via inventory agent request
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.8", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-35924", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:55:34.960101Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:58:12.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T19:35:33.232Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-gxh4-j63w-8jmm", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to SQL injection via inventory agent request" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35924", "datePublished": "2023-07-05T19:35:33.232Z", "dateReserved": "2023-06-20T14:02:45.592Z", "dateUpdated": "2024-10-18T19:58:12.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7562
Vulnerability from cvelistv5
Published
2018-03-12 21:00
Modified
2024-08-05 06:31
Severity ?
EPSS score ?
Summary
A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/pull/3650 | x_refsource_CONFIRM | |
https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/pull/3650" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file\u0027s extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-12T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/pull/3650" }, { "tags": [ "x_refsource_MISC" ], "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file\u0027s extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/pull/3650", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/pull/3650" }, { "name": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/", "refsource": "MISC", "url": "https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7562", "datePublished": "2018-03-12T21:00:00", "dateReserved": "2018-02-28T00:00:00", "dateUpdated": "2024-08-05T06:31:04.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41321
Vulnerability from cvelistv5
Published
2023-09-26 21:16
Modified
2024-09-23 20:24
Severity ?
EPSS score ?
Summary
Sensitive fields enumeration through API in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41321", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:24:32.564520Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:24:39.908Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.1.1, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T21:16:31.589Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836" } ], "source": { "advisory": "GHSA-3fxw-j5rj-w836", "discovery": "UNKNOWN" }, "title": "Sensitive fields enumeration through API in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41321", "datePublished": "2023-09-26T21:16:31.589Z", "dateReserved": "2023-08-28T16:56:43.365Z", "dateUpdated": "2024-09-23T20:24:39.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22500
Vulnerability from cvelistv5
Published
2023-01-25 06:03
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
glpi Unauthorized access to inventory files
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-3ghv-p34r-5ghx | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3ghv-p34r-5ghx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3ghv-p34r-5ghx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6 are vulnerable to Incorrect Authorization. This vulnerability allow unauthorized access to inventory files. Thus, if anonymous access to FAQ is allowed, inventory files are accessbile by unauthenticated users. This issue is patched in version 10.0.6. As a workaround, disable native inventory and delete inventory files from server (default location is `files/_inventory`)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-25T06:03:56.522Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3ghv-p34r-5ghx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-3ghv-p34r-5ghx" } ], "source": { "advisory": "GHSA-3ghv-p34r-5ghx", "discovery": "UNKNOWN" }, "title": "glpi Unauthorized access to inventory files" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22500", "datePublished": "2023-01-25T06:03:56.522Z", "dateReserved": "2022-12-29T17:41:28.091Z", "dateUpdated": "2024-08-02T10:13:48.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41320
Vulnerability from cvelistv5
Published
2023-09-26 21:15
Modified
2024-09-23 20:17
Severity ?
EPSS score ?
Summary
Account takeover via SQL Injection in UI layout preferences in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41320", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T20:17:03.509368Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T20:17:20.831Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T21:15:39.479Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476" } ], "source": { "advisory": "GHSA-mv2r-gpw3-g476", "discovery": "UNKNOWN" }, "title": "Account takeover via SQL Injection in UI layout preferences in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-41320", "datePublished": "2023-09-26T21:15:39.479Z", "dateReserved": "2023-08-28T16:56:43.365Z", "dateUpdated": "2024-09-23T20:17:20.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21327
Vulnerability from cvelistv5
Published
2021-03-08 17:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Unsafe Reflection in getItemForItemtype()
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a \u201cPOP chain\u201d. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-08T17:06:24", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html" } ], "source": { "advisory": "GHSA-qmw7-w2m4-rjwp", "discovery": "UNKNOWN" }, "title": "Unsafe Reflection in getItemForItemtype()", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21327", "STATE": "PUBLIC", "TITLE": "Unsafe Reflection in getItemForItemtype()" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a \u201cPOP chain\u201d. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp" }, { "name": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html" } ] }, "source": { "advisory": "GHSA-qmw7-w2m4-rjwp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21327", "datePublished": "2021-03-08T17:00:17", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21719
Vulnerability from cvelistv5
Published
2022-01-28 10:06
Modified
2024-08-03 02:53
Severity ?
EPSS score ?
Summary
Reflected XSS using reload button in GLPI
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.7 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:53:35.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-28T10:06:31", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48" } ], "source": { "advisory": "GHSA-6cj4-g839-gj5j", "discovery": "UNKNOWN" }, "title": "Reflected XSS using reload button in GLPI", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21719", "STATE": "PUBLIC", "TITLE": "Reflected XSS using reload button in GLPI" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.7", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.7" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j" }, { "name": "https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48" } ] }, "source": { "advisory": "GHSA-6cj4-g839-gj5j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21719", "datePublished": "2022-01-28T10:06:31", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:53:35.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13240
Vulnerability from cvelistv5
Published
2019-07-10 13:48
Modified
2024-08-04 23:49
Severity ?
EPSS score ?
Summary
An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user's password again during the next 24 hours without any information except the associated email address.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.4.1 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/compare/1783b78...8e621f6 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/commit/86a43ae47b3dd844947f40a2ffcf1a36e53dbba6 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7 | x_refsource_MISC | |
https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_unsafe_reset.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:24.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/compare/1783b78...8e621f6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/86a43ae47b3dd844947f40a2ffcf1a36e53dbba6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_unsafe_reset.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user\u0027s password again during the next 24 hours without any information except the associated email address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T13:48:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/compare/1783b78...8e621f6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/86a43ae47b3dd844947f40a2ffcf1a36e53dbba6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_unsafe_reset.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user\u0027s password again during the next 24 hours without any information except the associated email address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.4.1", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.4.1" }, { "name": "https://github.com/glpi-project/glpi/compare/1783b78...8e621f6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/compare/1783b78...8e621f6" }, { "name": "https://github.com/glpi-project/glpi/commit/86a43ae47b3dd844947f40a2ffcf1a36e53dbba6", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/86a43ae47b3dd844947f40a2ffcf1a36e53dbba6" }, { "name": "https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7" }, { "name": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_unsafe_reset.pdf", "refsource": "MISC", "url": "https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_unsafe_reset.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13240", "datePublished": "2019-07-10T13:48:26", "dateReserved": "2019-07-04T00:00:00", "dateUpdated": "2024-08-04T23:49:24.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36808
Vulnerability from cvelistv5
Published
2023-07-05 20:52
Modified
2024-10-18 19:39
Severity ?
EPSS score ?
Summary
GLPI vulnerable to SQL injection through Computer Virtual Machine information
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.8 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "glpi", "vendor": "glpi-project", "versions": [ { "lessThan": "10.0.8", "status": "affected", "version": "0.80", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36808", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:37:56.618324Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:39:38.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.80, \u003c 10.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T20:52:48.874Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8" } ], "source": { "advisory": "GHSA-vf5h-jh9q-2gjm", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to SQL injection through Computer Virtual Machine information" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36808", "datePublished": "2023-07-05T20:52:48.874Z", "dateReserved": "2023-06-27T15:43:18.383Z", "dateUpdated": "2024-10-18T19:39:38.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11184
Vulnerability from cvelistv5
Published
2017-07-28 05:00
Modified
2024-08-05 17:57
Severity ?
EPSS score ?
Summary
SQL injection exists in front/devicesoundcard.php in GLPI before 9.1.5 via the start parameter.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/2449 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/9.1.5 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:57:58.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/2449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection exists in front/devicesoundcard.php in GLPI before 9.1.5 via the start parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T04:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/2449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11184", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection exists in front/devicesoundcard.php in GLPI before 9.1.5 via the start parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/2449", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/2449" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/9.1.5", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/releases/tag/9.1.5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11184", "datePublished": "2017-07-28T05:00:00", "dateReserved": "2017-07-11T00:00:00", "dateUpdated": "2024-08-05T17:57:58.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23645
Vulnerability from cvelistv5
Published
2024-02-01 15:24
Modified
2024-08-01 23:06
Severity ?
EPSS score ?
Summary
GLPI reflected XSS in reports pages
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a | x_refsource_MISC | |
https://github.com/glpi-project/glpi/releases/tag/10.0.12 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-23645", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-02T20:06:43.727177Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:23.929Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:06:25.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x" }, { "name": "https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0" }, { "name": "https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.12", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.12" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 0.65, \u003c 10.0.12" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-01T17:49:23.773Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x" }, { "name": "https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0" }, { "name": "https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.12", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.12" } ], "source": { "advisory": "GHSA-2gj5-qpff-ff3x", "discovery": "UNKNOWN" }, "title": "GLPI reflected XSS in reports pages" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23645", "datePublished": "2024-02-01T15:24:57.438Z", "dateReserved": "2024-01-19T00:18:53.233Z", "dateUpdated": "2024-08-01T23:06:25.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2720
Vulnerability from cvelistv5
Published
2011-08-05 21:00
Modified
2024-08-06 23:08
Severity ?
EPSS score ?
Summary
The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:08:23.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/issues/3017" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726185" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14956" }, { "name": "45542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45542" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14951" }, { "name": "[oss-security] 20110726 Re: CVE Request -- GLPI -- Properly blacklist some sensitive fields", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/26/11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14957" }, { "name": "[oss-security] 20110725 CVE Request -- GLPI -- Properly blacklist some sensitive fields", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/25/7" }, { "name": "MDVSA-2012:014", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:014" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14958" }, { "name": "48884", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48884" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14955" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14966" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=237\u0026lang=en" }, { "name": "FEDORA-2011-9639", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14960" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14954" }, { "name": "FEDORA-2011-9690", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html" }, { "name": "45366", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14952" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://forge.indepnet.net/projects/glpi/versions/605" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-07-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-08-12T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/issues/3017" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726185" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14956" }, { "name": "45542", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45542" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14951" }, { "name": "[oss-security] 20110726 Re: CVE Request -- GLPI -- Properly blacklist some sensitive fields", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/26/11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14957" }, { "name": "[oss-security] 20110725 CVE Request -- GLPI -- Properly blacklist some sensitive fields", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/07/25/7" }, { "name": "MDVSA-2012:014", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:014" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14958" }, { "name": "48884", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48884" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14955" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14966" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=237\u0026lang=en" }, { "name": "FEDORA-2011-9639", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14960" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14954" }, { "name": "FEDORA-2011-9690", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html" }, { "name": "45366", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/14952" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://forge.indepnet.net/projects/glpi/versions/605" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2720", "datePublished": "2011-08-05T21:00:00", "dateReserved": "2011-07-11T00:00:00", "dateUpdated": "2024-08-06T23:08:23.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21326
Vulnerability from cvelistv5
Published
2021-03-08 17:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Horizontal Privilege Escalation
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | x_refsource_MISC | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-08T17:00:22", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" } ], "source": { "advisory": "GHSA-vmj9-cg56-p7wh", "discovery": "UNKNOWN" }, "title": "Horizontal Privilege Escalation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21326", "STATE": "PUBLIC", "TITLE": "Horizontal Privilege Escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003c 9.5.4" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/releases/tag/9.5.4", "refsource": "MISC", "url": "https://github.com/glpi-project/glpi/releases/tag/9.5.4" }, { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vmj9-cg56-p7wh" } ] }, "source": { "advisory": "GHSA-vmj9-cg56-p7wh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21326", "datePublished": "2021-03-08T17:00:22", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15226
Vulnerability from cvelistv5
Published
2020-10-07 19:20
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
SQL Injection in GLPI Search API
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:22.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.1, \u003c 9.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In GLPI before version 9.5.2, there is a SQL Injection in the API\u0027s search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T19:20:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0" } ], "source": { "advisory": "GHSA-jwpv-7m4h-5gvc", "discovery": "UNKNOWN" }, "title": "SQL Injection in GLPI Search API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15226", "STATE": "PUBLIC", "TITLE": "SQL Injection in GLPI Search API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glpi", "version": { "version_data": [ { "version_value": "\u003e= 9.1, \u003c 9.5.2" } ] } } ] }, "vendor_name": "glpi-project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In GLPI before version 9.5.2, there is a SQL Injection in the API\u0027s search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc" }, { "name": "https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0" } ] }, "source": { "advisory": "GHSA-jwpv-7m4h-5gvc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15226", "datePublished": "2020-10-07T19:20:14", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:22.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39323
Vulnerability from cvelistv5
Published
2022-11-03 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
SQL Injection on REST API in GLPI
References
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cp6q-9p4x-8hr9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003c 10.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cp6q-9p4x-8hr9" } ], "source": { "advisory": "GHSA-cp6q-9p4x-8hr9", "discovery": "UNKNOWN" }, "title": "SQL Injection on REST API in GLPI" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39323", "datePublished": "2022-11-03T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-13049
Vulnerability from cvelistv5
Published
2018-07-02 11:00
Modified
2024-08-05 08:52
Severity ?
EPSS score ?
Summary
The constructSQL function in inc/search.class.php in GLPI 9.2.x through 9.3.0 allows SQL Injection, as demonstrated by triggering a crafted LIMIT clause to front/computer.php.
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/issues/4270 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:52:50.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/issues/4270" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The constructSQL function in inc/search.class.php in GLPI 9.2.x through 9.3.0 allows SQL Injection, as demonstrated by triggering a crafted LIMIT clause to front/computer.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-02T11:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/issues/4270" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-13049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The constructSQL function in inc/search.class.php in GLPI 9.2.x through 9.3.0 allows SQL Injection, as demonstrated by triggering a crafted LIMIT clause to front/computer.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/glpi-project/glpi/issues/4270", "refsource": "CONFIRM", "url": "https://github.com/glpi-project/glpi/issues/4270" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-13049", "datePublished": "2018-07-02T11:00:00", "dateReserved": "2018-07-02T00:00:00", "dateUpdated": "2024-08-05T08:52:50.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37278
Vulnerability from cvelistv5
Published
2023-07-13 22:37
Modified
2024-10-18 18:19
Severity ?
EPSS score ?
Summary
GLPI vulnerable to SQL injection via dashboard administration
References
▼ | URL | Tags |
---|---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4 | x_refsource_CONFIRM | |
https://github.com/glpi-project/glpi/releases/tag/10.0.9 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
glpi-project | glpi |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T18:05:37.635214Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T18:19:09.135Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "glpi", "vendor": "glpi-project", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c 10.0.9" } ] } ], "descriptions": [ { "lang": "en", "value": "GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-13T22:37:29.892Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4" }, { "name": "https://github.com/glpi-project/glpi/releases/tag/10.0.9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/glpi-project/glpi/releases/tag/10.0.9" } ], "source": { "advisory": "GHSA-46gp-f96h-53w4", "discovery": "UNKNOWN" }, "title": "GLPI vulnerable to SQL injection via dashboard administration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37278", "datePublished": "2023-07-13T22:37:29.892Z", "dateReserved": "2023-06-29T19:35:26.441Z", "dateUpdated": "2024-10-18T18:19:09.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }