Summary
Detail | |||
---|---|---|---|
Vendor | Glpi-Project | First view | 2019-03-27 |
Product | Glpi | Last view | 2024-02-01 |
Version | 9.4.0 | Type | Application |
Update | rc2 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:glpi-project:glpi |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2024-02-01 | CVE-2024-23645 | GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12. |
8.1 | 2024-02-01 | CVE-2023-51446 | GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12. |
9.8 | 2023-12-13 | CVE-2023-46727 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, GLPI inventory endpoint can be used to drive a SQL injection attack. Version 10.0.11 contains a patch for the issue. As a workaround, disable native inventory. |
9.8 | 2023-12-13 | CVE-2023-46726 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue. |
8.8 | 2023-12-13 | CVE-2023-43813 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue. |
9.8 | 2023-11-02 | CVE-2023-42802 | GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server. |
9.1 | 2023-09-27 | CVE-2023-42462 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
9.8 | 2023-09-27 | CVE-2023-42461 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
5.4 | 2023-09-27 | CVE-2023-41888 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
8.8 | 2023-09-27 | CVE-2023-41326 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
8.8 | 2023-09-27 | CVE-2023-41324 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that have read access on users resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
5.3 | 2023-09-27 | CVE-2023-41323 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
8.8 | 2023-09-27 | CVE-2023-41322 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability. |
6.5 | 2023-09-27 | CVE-2023-41321 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
9.8 | 2023-09-27 | CVE-2023-41320 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. |
9.1 | 2023-07-13 | CVE-2023-37278 | GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9. |
9.8 | 2023-07-05 | CVE-2023-36808 | GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory. |
7.5 | 2023-07-05 | CVE-2023-35940 | GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue. |
8.1 | 2023-07-05 | CVE-2023-35939 | GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a on a file accessible by an authenticated user (or not for certain actions), allows a threat actor to interact, modify, or see Dashboard data. Version 10.0.8 contains a patch for this issue. |
9.8 | 2023-07-05 | CVE-2023-35924 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory. |
6.1 | 2023-07-05 | CVE-2023-34244 | GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch. |
6.5 | 2023-07-05 | CVE-2023-34107 | GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue. |
6.5 | 2023-07-05 | CVE-2023-34106 | GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch. |
4.8 | 2023-04-05 | CVE-2023-28852 | GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue. |
5.4 | 2023-04-05 | CVE-2023-28849 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
36% (30) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
21% (18) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
4% (4) | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
3% (3) | CWE-639 | Access Control Bypass Through User-Controlled Key |
3% (3) | CWE-284 | Access Control (Authorization) Issues |
3% (3) | CWE-200 | Information Exposure |
2% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
2% (2) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
2% (2) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (2) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
1% (1) | CWE-798 | Use of Hard-coded Credentials |
1% (1) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
1% (1) | CWE-613 | Insufficient Session Expiration |
1% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (1) | CWE-552 | Files or Directories Accessible to External Parties |
1% (1) | CWE-522 | Insufficiently Protected Credentials |
1% (1) | CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsa... |
1% (1) | CWE-285 | Improper Access Control (Authorization) |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-203 | Information Exposure Through Discrepancy |
1% (1) | CWE-90 | Failure to Sanitize Data into LDAP Queries ('LDAP Injection') |
1% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-20 | Improper Input Validation |
1% (1) | CWE-19 | Data Handling |