CVE-2022-31061 – SQL injection on login page in GLPI
https://notcve.org/view.php?id=CVE-2022-31061
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. • https://github.com/Wangyanan131/CVE-2022-31061 https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514 https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-31068 – Sensitive Data Exposure on Refused Inventory Files in GLPI
https://notcve.org/view.php?id=CVE-2022-31068
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade. GLPI es un paquete de software gratuito de administración de activos y TI, administración de centros de datos, ITIL Service Desk, seguimiento de licencias y auditoría de software. • https://github.com/glpi-project/glpi/commit/9953a644777e4167b06db9e14fc93b945a557be5 https://github.com/glpi-project/glpi/security/advisories/GHSA-g4hm-6vfr-q3wg • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-31056 – SQL injection with _actor parameter in GLPI
https://notcve.org/view.php?id=CVE-2022-31056
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade. GLPI es un paquete gratuito de software de administración de activos y TI, administración de centros de datos, ITIL Service Desk, seguimiento de licencias y auditoría de software. En versiones afectadas, todos los formularios de asistencia (Ticket/Change/Problem) permiten una inyección de sql en los campos de actor. • https://www.exploit-db.com/exploits/51233 http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-31082 – SQL Injection via package deployment tasks in glpi-inventory-plugin
https://notcve.org/view.php?id=CVE-2022-31082
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. glpi-inventory-plugin is a plugin for GLPI to handle inventory management. In affected versions a SQL injection can be made using package deployment tasks. This issue has been resolved in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should delete the `front/deploypackage.public.php` file if they are not using the `deploy tasks` feature. • https://github.com/glpi-project/glpi-inventory-plugin/commit/0b805ca6fb2a0f9bde4af29fca4f703fdfbd8f66 https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-q6m7-h6rj-5wmw • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-31062 – Unauthenticated Local File Inclusion
https://notcve.org/view.php?id=CVE-2022-31062
### Impact A plugin public script can be used to read content of system files. ### Patches Upgrade to version 1.0.2. ### Workarounds `b/deploy/index.php` file can be deleted if deploy feature is not used. ### Impacto Un script público del plugin puede ser usado para leer el contenido de los archivos del sistema. ### Parches Actualizar a versión 1.0.2. ### Mitigaciones el archivo "b/deploy/index.php" puede ser eliminado si no es usada la función deploy GLPI Glpiinventory versions 1.0.1 and below suffer from a local file inclusion vulnerability. • https://www.exploit-db.com/exploits/51230 http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html https://github.com/glpi-project/glpi-inventory-plugin/security/advisories/GHSA-q33f-jcjf-p4v9 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •