CVE-2022-29250 – SQL injection in GLPI
https://notcve.org/view.php?id=CVE-2022-29250
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to version 10.0.1 it is possible to add extra information by SQL injection on search pages. In order to exploit this vulnerability a user must be logged in. GLPI es un paquete de software gratuito de administración de activos y TI que ofrece funciones de Service Desk de ITIL, seguimiento de licencias y auditoría de software. En versiones anteriores a 10.0.1, es posible añadir información extra mediante inyección SQL en las páginas de búsqueda. • https://github.com/glpi-project/glpi/security/advisories/GHSA-5w33-4wrx-8hvw • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-24876 – Stored cross site scrpting in GLPI's Kanban
https://notcve.org/view.php?id=CVE-2022-24876
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue. • https://github.com/glpi-project/glpi/commit/9a3c7487c8761eaa8f3b07589d6dcdfa5d1e4ed6 https://github.com/glpi-project/glpi/security/advisories/GHSA-33g2-m556-gccr • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24869 – Cross Site Scripting in GLPI
https://notcve.org/view.php?id=CVE-2022-24869
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade. GLPI es un paquete de software gratuito de administración de activos y TI, que proporciona funciones de Service Desk de ITIL, seguimiento de licencias y auditoría de software. • https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20 https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e https://github.com/glpi-project/glpi/releases/tag/10.0.0 https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24868 – Cross site scripting via SVG file upload in GLPI
https://notcve.org/view.php?id=CVE-2022-24868
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars. • https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24867 – LDAP password exposure in glpi
https://notcve.org/view.php?id=CVE-2022-24867
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue. • https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •