In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p | Third Party Advisory |
https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p - Third Party Advisory |
Information
Published : 2020-11-26 17:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27662
Mitre link : CVE-2020-27662
CVE.ORG link : CVE-2020-27662
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-639
Authorization Bypass Through User-Controlled Key