← Back to CVEs
CVE-2023-42802
CRITICAL10.0
Description
GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published11/2/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
glpi-project:glpi
Weaknesses (CWE)
CWE-20CWE-434
References
https://github.com/glpi-project/glpi/releases/tag/10.0.10(security-advisories@github.com)
https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m(security-advisories@github.com)
https://github.com/glpi-project/glpi/releases/tag/10.0.10(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.