8.8
CVE-2023-29006
- EPSS 0.69%
- Veröffentlicht 05.04.2023 18:15:08
- Zuletzt bearbeitet 21.11.2024 07:56:22
- Quelle security-advisories@github.com
- Teams Watchlist Login
- Unerledigt Login
The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Glpi-project ≫ Order SwPlatformglpi Version >= 1.8.0 < 2.7.7
Glpi-project ≫ Order Version2.10.0 SwPlatformglpi
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.69% | 0.705 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
security-advisories@github.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.