SB2023071034 - Multiple vulnerabilities in GLPI
Published: July 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2023-36808)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within Computer Virtual Machine information. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) Improper access control (CVE-ID: CVE-2023-34106)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to incorrect rights check on a file. A remote user can bypass implemented security restrictions, gain unauthorized access to the list of all users and their personal information.
3) Improper access control (CVE-ID: CVE-2023-34107)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to incorrect rights check on a file. A remote user can bypass implemented security restrictions and gain unauthorized access to all knowledge base items.
4) Improper access control (CVE-ID: CVE-2023-35939)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to incorrect rights check on a file. A remote user can bypass implemented security restrictions and interact, modify or see dashboard data.
5) Cross-site scripting (CVE-ID: CVE-2023-34244)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in search pages. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
6) SQL injection (CVE-ID: CVE-2023-35924)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within inventory agent request. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
7) Information disclosure (CVE-ID: CVE-2023-35940)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to incorrect rights check on a file. A remote attacker can gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.
References
- https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm
- https://github.com/glpi-project/glpi/releases/tag/10.0.8
- https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c
- https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4
- https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c
- https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w
- https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm
- https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw