
CVE-2020-11035 – weak CSRF tokens in GLPI
https://notcve.org/view.php?id=CVE-2020-11035
05 May 2020 — In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6. En GLPI posterior a la versión 0.83.3 y versiones anteriores a 9.4.6, los tokens CSRF son generados usando un algoritmo no seguro. La implementación utiliza rand y uniqid y MD5 que no proporcionan valores seguros. • https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVE-2020-11034 – bypass of manageRedirect in GLPI
https://notcve.org/view.php?id=CVE-2020-11034
05 May 2020 — In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6. En GLPI versiones anteriores a 9.4.6, se presenta una vulnerabilidad que permite omitir la protección de redireccionamiento abierto el cual es basada en un regexp. Esto es corregido en la versión 9.4.6. • https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg • CWE-185: Incorrect Regular Expression CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2020-11033 – Able to read any token through API user endpoint in GLPI
https://notcve.org/view.php?id=CVE-2020-11033
05 May 2020 — In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an applicatio... • https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2020-11032 – SQL injection on addme_observer and addme_assign in GLPI
https://notcve.org/view.php?id=CVE-2020-11032
05 May 2020 — In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6. En GLPI versiones anteriores a 9.4.6, se presenta una vulnerabilidad de inyección SQL para todas las instancias del helpdesk. Una explotación de esta vulnerabilidad requiere una cuenta de técnico. • https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2013-2227 – GLPI 0.83.8 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-2227
01 Nov 2019 — GLPI 0.83.7 has Local File Inclusion in common.tabs.php. GLPI versión 0.83.7, presenta una inclusión de archivos locales en el archivo common.tabs.php. • https://www.exploit-db.com/exploits/26366 • CWE-20: Improper Input Validation •

CVE-2019-14666
https://notcve.org/view.php?id=CVE-2019-14666
25 Sep 2019 — GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes. GLPI versiones hasta 9.4.3, es prop... • https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2019-1010307
https://notcve.org/view.php?id=CVE-2019-1010307
15 Jul 2019 — GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the "Link Tickets" feature, 3- a request to the endpoint fetches js and executes it. El producto GLPI versión 9.3.1 de GLPI, está afectado por: Cross Site Scripting (XSS). • https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-1010310
https://notcve.org/view.php?id=CVE-2019-1010310
12 Jul 2019 — GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools > Reminder > Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. • https://github.com/glpi-project/glpi/pull/5519 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2019-13240
https://notcve.org/view.php?id=CVE-2019-13240
10 Jul 2019 — An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user's password again during the next 24 hours without any information except the associated email address. Se detectó un problema en GLPI versiones anteriores a 9.4.1. Después de que un usuario haya restablecido con éxito la contraseña, es posible cambiarla de nuevo durante las próximas 24 horas sin ninguna información, excepto la dirección de correo electrónico asociada. • https://github.com/glpi-project/glpi/commit/5da9f99b2d81713b1e36016b47ce656a33648bc7 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVE-2019-13239
https://notcve.org/view.php?id=CVE-2019-13239
04 Jul 2019 — inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture. inc/user.class.php en GLPI en versiones anteriores a la 9.4.3 permite Cross-Site Scripting (XSS) mediante una imagen de usuario. • https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •