Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-15175
HistoryOct 07, 2020 - 12:00 a.m.

CVE-2020-15175

2020-10-0700:00:00
ubuntu.com
ubuntu.com
6

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

51.2%

In GLPI before version 9.5.2, the ​pluginimage.send.php​ endpoint allows
a user to specify an image from a plugin. The parameters can be maliciously
crafted to instead delete the .htaccess file for the files directory. Any
user becomes able to read all the files and folders contained in “/files/”.
Some of the sensitive information that is compromised are the user
sessions, logs, and more. An attacker would be able to get the
Administrators session token and use that to authenticate. The issue is
patched in version 9.5.2.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchglpi< anyUNKNOWN

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

51.2%