Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2013-5696 First vendor Publication 2013-09-22
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5696

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 86

ExploitDB Exploits

id Description
2013-10-02 GLPI 0.84.1 - Multiple Vulnerabilities
2013-09-23 GLPI install.php Remote Command Execution

Snort® IPS/IDS

Date Description
2014-01-10 GLPI install.php arbitrary code injection attempt
RuleID : 28051 - Revision : 2 - Type : SERVER-WEBAPP
2014-01-10 GLPI install.php arbitrary code injection attempt
RuleID : 28050 - Revision : 2 - Type : SERVER-WEBAPP
2014-01-10 GLPI install.php arbitrary code injection attempt
RuleID : 28049 - Revision : 2 - Type : SERVER-WEBAPP
2014-01-10 GLPI install.php arbitrary code injection attempt
RuleID : 28048 - Revision : 2 - Type : SERVER-WEBAPP

Metasploit Database

id Description
2013-09-12 GLPI install.php Remote Command Execution

Nessus® Vulnerability Scanner

Date Description
2013-10-13 Name : The remote Fedora host is missing a security update.
File : fedora_2013-18202.nasl - Type : ACT_GATHER_INFO
2013-09-26 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2013-240.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://www.glpi-project.org/spip.php?page=annonce&id_breve=308
https://forge.indepnet.net/issues/4480
https://forge.indepnet.net/projects/glpi/repository/revisions/21753
https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/bran...
https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Date Informations
2024-11-28 12:37:05
  • Multiple Updates
2024-08-02 12:25:27
  • Multiple Updates
2024-08-02 01:07:36
  • Multiple Updates
2024-02-02 01:24:44
  • Multiple Updates
2024-02-01 12:07:21
  • Multiple Updates
2023-09-05 12:23:24
  • Multiple Updates
2023-09-05 01:07:15
  • Multiple Updates
2023-09-02 12:23:23
  • Multiple Updates
2023-09-02 01:07:20
  • Multiple Updates
2023-08-22 12:21:08
  • Multiple Updates
2022-10-11 01:07:01
  • Multiple Updates
2021-05-04 12:27:48
  • Multiple Updates
2021-04-22 01:33:34
  • Multiple Updates
2020-05-24 01:12:25
  • Multiple Updates
2020-05-23 13:17:03
  • Multiple Updates
2020-05-23 00:38:25
  • Multiple Updates
2019-07-18 12:05:32
  • Multiple Updates
2016-04-26 23:41:24
  • Multiple Updates
2016-03-05 05:20:44
  • Multiple Updates
2016-03-05 00:23:56
  • Multiple Updates
2014-02-17 11:23:29
  • Multiple Updates
2014-01-19 21:29:39
  • Multiple Updates
2014-01-03 17:19:06
  • Multiple Updates
2013-10-06 17:18:47
  • Multiple Updates
2013-09-29 17:20:25
  • Multiple Updates
2013-09-26 21:23:07
  • Multiple Updates
2013-09-23 21:20:21
  • Multiple Updates
2013-09-23 13:20:01
  • First insertion