CVE-2013-5696

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.8:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.9:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.83.91:*:*:*:*:*:*:*
cpe:2.3:a:glpi-project:glpi:0.84:*:*:*:*:*:*:*

History

21 Nov 2024, 01:57

Type Values Removed Values Added
References () http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 - Patch () http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 - Patch
References () https://forge.indepnet.net/issues/4480 - () https://forge.indepnet.net/issues/4480 -
References () https://forge.indepnet.net/projects/glpi/repository/revisions/21753 - Patch () https://forge.indepnet.net/projects/glpi/repository/revisions/21753 - Patch
References () https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php - Patch () https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php - Patch
References () https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html - Exploit () https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html - Exploit

Information

Published : 2013-09-23 03:49

Updated : 2024-11-21 01:57


NVD link : CVE-2013-5696

Mitre link : CVE-2013-5696

CVE.ORG link : CVE-2013-5696


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-352

Cross-Site Request Forgery (CSRF)