GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/releases/tag/10.0.7 | Patch Release Notes |
https://github.com/glpi-project/glpi/releases/tag/9.5.13 | Patch Release Notes |
https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-04-05 18:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-28838
Mitre link : CVE-2023-28838
CVE.ORG link : CVE-2023-28838
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')