Show filters
170 Total Results
Displaying 61-70 of 170
Sort by:
Attacker Value
Unknown

CVE-2022-34126

Disclosure Date: April 16, 2023 (last updated October 08, 2023)
The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.
Attacker Value
Unknown

CVE-2022-34125

Disclosure Date: April 16, 2023 (last updated October 08, 2023)
front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
Attacker Value
Unknown

CVE-2023-29006

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
Attacker Value
Unknown

CVE-2023-28852

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
Attacker Value
Unknown

CVE-2023-28849

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.
Attacker Value
Unknown

CVE-2023-28838

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user.
Attacker Value
Unknown

CVE-2023-28639

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.
Attacker Value
Unknown

CVE-2023-28636

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7.
Attacker Value
Unknown

CVE-2023-28634

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
Attacker Value
Unknown

CVE-2023-28633

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.