CVE-2023-42802

GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

09 Nov 2023, 18:39

Type Values Removed Values Added
References (MISC) https://github.com/glpi-project/glpi/releases/tag/10.0.10 - (MISC) https://github.com/glpi-project/glpi/releases/tag/10.0.10 - Release Notes
References (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-20 CWE-434
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
First Time Glpi-project glpi
Glpi-project

02 Nov 2023, 14:26

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-02 14:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-42802

Mitre link : CVE-2023-42802

CVE.ORG link : CVE-2023-42802


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-20

Improper Input Validation