Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28838
HistoryApr 05, 2023 - 5:39 p.m.

CVE-2023-28838 GLPI vulnerable to SQL injection through dynamic reports

2023-04-0517:39:04
CWE-89
GitHub_M
www.cve.org
glpi
sql injection
vulnerability
dynamic reports
version 0.50
versions 9.5.13
version 10.0.7
patch
webshell
server
workaround
read rights
statistics

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

36.2%

GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove Assistance > Statistics and Tools > Reports read rights from every user.

CNA Affected

[
  {
    "vendor": "glpi-project",
    "product": "glpi",
    "versions": [
      {
        "version": ">= 0.50, < 9.5.13",
        "status": "affected"
      },
      {
        "version": ">= 10.0.0, < 10.0.7",
        "status": "affected"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

36.2%

Related for CVELIST:CVE-2023-28838