
CVE-2023-33971 – Formcreator vulnerable to stored XSS from ##FULLFORM##
https://notcve.org/view.php?id=CVE-2023-33971
31 May 2023 — Formcreator is a GLPI plugin which allow creation of custom forms and the creation of one or more tickets when the form is filled. A probable stored cross-site scripting vulnerability is present in Formcreator 2.13.5 and prior via the use of the use of `##FULLFORM##` for rendering. This could result in arbitrary javascript code execution in an admin/tech context. A patch is unavailable as of time of publication. As a workaround, one may use a regular expression to remove `< > "` in all fields. • https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-28855 – Fields GLPI plugin vulnerable to unauthorized write access to additional fields
https://notcve.org/view.php?id=CVE-2023-28855
05 Apr 2023 — Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to versions 1.13.1 and 1.20.4, lack of access control check allows any authenticated user to write data to any fields container, including those to which they have no configured access. Versions 1.13.1 and 1.20.4 contain a patch for this issue. • https://github.com/pluginsGLPI/fields/commit/784260be7db185bb1e7d66b299997238c4c0205d • CWE-269: Improper Privilege Management •

CVE-2021-39190 – SCCM plugin for GLPI vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
https://notcve.org/view.php?id=CVE-2021-39190
22 Sep 2022 — The SCCM plugin for GLPI is a plugin to synchronize computers from SCCM (version 1802) to GLPI. In versions prior to 2.3.0, the Configuration page is publicly accessible in read-only mode. This issue is patched in version 2.3.0. No known workarounds exist. El plugin de SCCM para GLPI es un plugin para sincronizar equipos de SCCM (versión 1802) con GLPI. • https://github.com/pluginsGLPI/sccm/commit/29a7f92d32a0cf9aa3f22c52c50b738274d2813e • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVE-2021-43779 – Remote Command Execution vulnerability
https://notcve.org/view.php?id=CVE-2021-43779
05 Jan 2022 — GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin. GLPI es un sistema de administración de activos de TI de código abierto, un sistema de seguimi... • https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-12724
https://notcve.org/view.php?id=CVE-2019-12724
10 Jul 2019 — An issue was discovered in the Teclib News plugin through 1.5.2 for GLPI. It allows a stored XSS attack via the $_POST['name'] parameter. Se detectó un problema en el plugin News de Teclib hasta la versión 1.5.2 para GLPI. Permite un ataque de tipo XSS almacenado por medio del parámetro $_POST['nombre']. • https://github.com/pluginsGLPI/news/blob/master/front/alert.form.php • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-12723
https://notcve.org/view.php?id=CVE-2019-12723
10 Jul 2019 — An issue was discovered in the Teclib Fields plugin through 1.9.2 for GLPI. it allows SQL Injection via container_id and old_order parameters to ajax/reorder.php by an unauthenticated user. Se detectó un problema en el plugin Fields hasta versión 1.9.2 de Teclib para GLPI. Esto permite una Inyección SQL por medio de los parámetros container_id y old_order en el archivo ajax/reorder.php por parte de un usuario no identificado. • https://github.com/pluginsGLPI/fields/blob/master/ajax/reorder.php • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2019-10232
https://notcve.org/view.php?id=CVE-2019-10232
27 Mar 2019 — Teclib GLPI through 9.3.3 has SQL injection via the "cycle" parameter in /scripts/unlock_tasks.php. Teclib GLPI, hasta la versión 9.3.3, tiene una inyección SQL mediante el parámetro "cycle" en /scripts/unlock_tasks.php. • https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2019-10231
https://notcve.org/view.php?id=CVE-2019-10231
27 Mar 2019 — Teclib GLPI before 9.4.1.1 is affected by a PHP type juggling vulnerability allowing bypass of authentication. This occurs in Auth::checkPassword() (inc/auth.class.php). Teclib GLPI, en versiones anteriores a la 9.4.1.1, se ha visto afectado por una vulnerabilidad de manipulación de tipos en PHP que permite la omisión de la autenticación. Esto ocurre en Auth::checkPassword(), en inc/auth.class.php. • https://github.com/glpi-project/glpi/pull/5520 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2018-7289 – Armadito Antivirus 0.12.7.2 - Detection Bypass
https://notcve.org/view.php?id=CVE-2018-7289
21 Feb 2018 — An issue was discovered in armadito-windows-driver/src/communication.c in Armadito 0.12.7.2. Malware with filenames containing pure UTF-16 characters can bypass detection. The user-mode service will fail to open the file for scanning after the conversion is done from Unicode to ANSI. This happens because characters that cannot be converted from Unicode are replaced with '?' characters. • https://packetstorm.news/files/id/146543 • CWE-172: Encoding Error •