Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-15177
HistoryOct 07, 2020 - 12:00 a.m.

CVE-2020-15177

2020-10-0700:00:00
ubuntu.com
ubuntu.com
15
glpi
insecure storage
user input
cross-site scripting
insecure redirection
vulnerability
patched
version 9.5.2

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

29.3%

In GLPI before version 9.5.2, the install/install.php endpoint insecurely
stores user input into the database as url_base and url_base_api. These
settings are referenced throughout the application and allow for
vulnerabilities like Cross-Site Scripting and Insecure Redirection Since
authentication is not required to perform these changes,anyone could point
these fields at malicious websites or form input in a way to trigger XSS.
Leveraging JavaScript it’s possible to steal cookies, perform actions as
the user, etc. The issue is patched in version 9.5.2.

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchglpi< anyUNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.001

Percentile

29.3%