CVE-2015-7685
https://notcve.org/view.php?id=CVE-2015-7685
GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php. GLPI en versiones anteriores a 0.85.3 permite a usuarios remotos autenticados crear cuentas de super-admin mediante el aprovechamiento de permisos para crear un usuario y el parámetro _profiles_id para front/user.form.php. • http://seclists.org/fulldisclosure/2015/Feb/71 http://www.glpi-project.org/spip.php?page=annonce&id_breve=338 https://forge.glpi-project.org/issues/5218 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-8360
https://notcve.org/view.php?id=CVE-2014-8360
Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php. Vulnerabilidad de salto de directorio en inc/autoload.function.php en GLPI anterior a 0.84.8 permite a atacantes remotos incluir y ejecutar ficheros locales arbitrarios a través de un .._ (punto punto guión bajo) en un tipo item en getItemForItemtype, tal y como fue demostrado por el parámetro itemtype en ajax/common.tabs.php. • http://advisories.mageia.org/MGASA-2015-0017.html http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en http://www.glpi-project.org/spip.php?page=annonce&id_breve=330 http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 https://forge.indepnet.net/issues/5101 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2014-5032
https://notcve.org/view.php?id=CVE-2014-5032
GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. GLPI anterior a 0.84.7 no restringe correctamente el acceso a la información de costes, lo que permite a atacantes remotos obtener información sensible a través del criterio de costes en la barra de búsqueda. • http://advisories.mageia.org/MGASA-2015-0017.html http://www.glpi-project.org/spip.php?page=annonce&id_breve=325 http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 https://forge.indepnet.net/issues/4984 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-9258 – GLPI 0.85 - Blind SQL Injection
https://notcve.org/view.php?id=CVE-2014-9258
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter. Vulnerabilidad de inyección SQL en ajax/getDropdownValue.php en GLPI anterior a 0.85.1 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro condition. • https://www.exploit-db.com/exploits/35528 http://advisories.mageia.org/MGASA-2015-0017.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html http://osvdb.org/show/osvdb/115957 http://secunia.com/advisories/61367 http://security.szurek.pl/glpi-085-blind-sql-injection.html http://www.exploit-db.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2013-5696 – GLPI - 'install.php' Remote Command Execution
https://notcve.org/view.php?id=CVE-2013-5696
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php después de una instalación completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a través de una acción Etape_4 o (2) ejecutar código PHP arbitrario a través de una acción update_1. GLPI version 0.84.1 suffers from improper access control bypass and PHP code injection vulnerabilities. • https://www.exploit-db.com/exploits/28483 https://www.exploit-db.com/exploits/28685 http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 https://forge.indepnet.net/issues/4480 https://forge.indepnet.net/projects/glpi/repository/revisions/21753 https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html • CWE-352: Cross-Site Request Forgery (CSRF) •