Glpi-project

Glpi

179 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 17.07.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:49

In glpi before 9.5.1, there is a SQL injection for all usages of "Clone" feature. This has been fixed in 9.5.1.

  • EPSS 7.01%
  • Veröffentlicht 12.05.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:42

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, t...

  • EPSS 0.2%
  • Veröffentlicht 12.05.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:42

In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6.

  • EPSS 2.84%
  • Veröffentlicht 12.05.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:33:45

GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before inst...

  • EPSS 0.45%
  • Veröffentlicht 05.05.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:38

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalat...

  • EPSS 55.8%
  • Veröffentlicht 05.05.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:38

In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6.

  • EPSS 0.24%
  • Veröffentlicht 05.05.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:38

In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.

Exploit
  • EPSS 0.79%
  • Veröffentlicht 05.05.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:39

In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content "<script>alert(1)</script>" reproduces the attac...

  • EPSS 0.31%
  • Veröffentlicht 05.05.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:37

In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6.

Exploit
  • EPSS 31.19%
  • Veröffentlicht 01.11.2019 17:15:10
  • Zuletzt bearbeitet 21.11.2024 01:51:17

GLPI 0.83.7 has Local File Inclusion in common.tabs.php.