GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin.
References
Link | Resource |
---|---|
https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin | Exploit Third Party Advisory |
https://github.com/pluginsGLPI/addressing/commit/6f55964803054a5acb5feda92c7c7f1d91ab5366 | Patch Third Party Advisory |
https://github.com/pluginsGLPI/addressing/security/advisories/GHSA-q5fp-xpr8-77jh | Exploit Third Party Advisory |
https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin | Exploit Third Party Advisory |
https://github.com/pluginsGLPI/addressing/commit/6f55964803054a5acb5feda92c7c7f1d91ab5366 | Patch Third Party Advisory |
https://github.com/pluginsGLPI/addressing/security/advisories/GHSA-q5fp-xpr8-77jh | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin - Exploit, Third Party Advisory | |
References | () https://github.com/pluginsGLPI/addressing/commit/6f55964803054a5acb5feda92c7c7f1d91ab5366 - Patch, Third Party Advisory | |
References | () https://github.com/pluginsGLPI/addressing/security/advisories/GHSA-q5fp-xpr8-77jh - Exploit, Third Party Advisory |
Information
Published : 2022-01-05 19:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43779
Mitre link : CVE-2021-43779
CVE.ORG link : CVE-2021-43779
JSON object : View
Products Affected
teclib-edition
- addressing