Vulnerabilities (CVE)

Filtered by vendor Glpi-project Subscribe
Filtered by product Glpi
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-43813 1 Glpi-project 1 Glpi 2023-12-18 N/A 8.8 HIGH
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue.
CVE-2022-24867 1 Glpi-project 1 Glpi 2022-05-03 7.8 HIGH 7.5 HIGH
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.
CVE-2020-11060 1 Glpi-project 1 Glpi 2021-11-04 9.0 HIGH 8.8 HIGH
In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.
CVE-2021-39213 1 Glpi-project 1 Glpi 2021-09-28 6.0 MEDIUM 8.8 HIGH
GLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.
CVE-2021-39209 1 Glpi-project 1 Glpi 2021-09-27 6.8 MEDIUM 8.8 HIGH
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading.
CVE-2020-11033 2 Fedoraproject, Glpi-project 2 Fedora, Glpi 2021-09-14 6.0 MEDIUM 7.2 HIGH
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
CVE-2021-21327 1 Glpi-project 1 Glpi 2021-03-16 5.0 MEDIUM 7.5 HIGH
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4.
CVE-2020-15176 1 Glpi-project 1 Glpi 2020-10-16 5.0 MEDIUM 8.6 HIGH
In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2
CVE-2020-11031 1 Glpi-project 1 Glpi 2020-10-05 5.0 MEDIUM 7.5 HIGH
In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium.
CVE-2019-10233 1 Glpi-project 1 Glpi 2020-08-24 6.8 MEDIUM 8.1 HIGH
Teclib GLPI before 9.4.1.1 is affected by a timing attack associated with a cookie.
CVE-2019-14666 1 Glpi-project 1 Glpi 2020-08-24 6.5 MEDIUM 8.8 HIGH
GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.
CVE-2020-15108 1 Glpi-project 1 Glpi 2020-07-22 4.0 MEDIUM 7.1 HIGH
In glpi before 9.5.1, there is a SQL injection for all usages of "Clone" feature. This has been fixed in 9.5.1.
CVE-2020-11032 1 Glpi-project 1 Glpi 2020-05-07 6.5 MEDIUM 7.2 HIGH
In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6.
CVE-2013-2227 2 Debian, Glpi-project 2 Debian Linux, Glpi 2019-11-04 5.0 MEDIUM 7.5 HIGH
GLPI 0.83.7 has Local File Inclusion in common.tabs.php.
CVE-2019-10477 2 Fusioninventory, Glpi-project 2 Fusioninventory, Glpi 2019-04-01 5.0 MEDIUM 7.5 HIGH
The FusionInventory plugin before 1.4 for GLPI 9.3.x and before 1.1 for GLPI 9.4.x mishandles sendXML actions.
CVE-2018-13049 1 Glpi-project 1 Glpi 2018-08-30 6.5 MEDIUM 8.8 HIGH
The constructSQL function in inc/search.class.php in GLPI 9.2.x through 9.3.0 allows SQL Injection, as demonstrated by triggering a crafted LIMIT clause to front/computer.php.
CVE-2018-7562 1 Glpi-project 1 Glpi 2018-04-11 6.0 MEDIUM 7.5 HIGH
A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php.
CVE-2017-11475 1 Glpi-project 1 Glpi 2017-08-29 6.5 MEDIUM 8.8 HIGH
GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php.
CVE-2016-7508 1 Glpi-project 1 Glpi 2017-08-12 6.0 MEDIUM 7.5 HIGH
Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
CVE-2016-7507 1 Glpi-project 1 Glpi 2017-07-25 6.0 MEDIUM 8.0 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to submit a request that could lead to the creation of an admin account in the application.