front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
References
Link | Resource |
---|---|
https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3 | Third Party Advisory |
https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f | Third Party Advisory |
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-04-16 03:15
Updated : 2024-02-28 20:13
NVD link : CVE-2022-34125
Mitre link : CVE-2022-34125
CVE.ORG link : CVE-2022-34125
JSON object : View
Products Affected
glpi-project
- cmdb
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor