CVE-2018-7562
https://notcve.org/view.php?id=CVE-2018-7562
A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php. • https://github.com/glpi-project/glpi/pull/3650 https://membership.backbox.org/glpi-9-2-1-multiple-vulnerabilities • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2017-11184
https://notcve.org/view.php?id=CVE-2017-11184
SQL injection exists in front/devicesoundcard.php in GLPI before 9.1.5 via the start parameter. Se presenta una inyección SQL en el archivo front/devicesoundcard.php en GLPI anterior a la versión 9.1.5, por medio del parámetro start. • https://github.com/glpi-project/glpi/issues/2449 https://github.com/glpi-project/glpi/releases/tag/9.1.5 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2017-11183
https://notcve.org/view.php?id=CVE-2017-11183
front/backup.php in GLPI before 9.1.5 allows remote authenticated administrators to delete arbitrary files via a crafted file parameter. El archivo front/backup.php en GLPI anterior a la versión 9.1.5, permite a los administradores autenticados remotos eliminar archivos arbitrarios por medio de un parámetro file creado. • https://github.com/glpi-project/glpi/issues/2450 https://github.com/glpi-project/glpi/releases/tag/9.1.5 • CWE-20: Improper Input Validation •
CVE-2017-11474
https://notcve.org/view.php?id=CVE-2017-11474
GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php. GLPI anterior a versión 9.1.5.1, presenta Inyección SQL en la variable $crit en el archivo inc/computer_softwareversion.class.php, explotable mediante ajax/common.tabs.php. • https://github.com/glpi-project/glpi/issues/2475 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2017-11475
https://notcve.org/view.php?id=CVE-2017-11475
GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php. GLPI anterior a versión 9.1.5.1, presenta inyección SQL en el campo condition rule, explotable mediante front/rulesengine.test.php. • https://github.com/glpi-project/glpi/issues/2476 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •