Page 8 of 88 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2018 — A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes ... • https://github.com/glpi-project/glpi/pull/3650 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2018 — An issue was discovered in GLPI through 9.2.1. The application is affected by XSS in the query string to front/preference.php. An attacker is able to create a malicious URL that, if opened by an authenticated user with debug privilege, will execute JavaScript code supplied by the attacker. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Se ha ... • https://github.com/glpi-project/glpi/pull/3647 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

28 Jul 2017 — front/backup.php in GLPI before 9.1.5 allows remote authenticated administrators to delete arbitrary files via a crafted file parameter. El archivo front/backup.php en GLPI anterior a la versión 9.1.5, permite a los administradores autenticados remotos eliminar archivos arbitrarios por medio de un parámetro file creado. • https://github.com/glpi-project/glpi/issues/2450 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

28 Jul 2017 — SQL injection exists in front/devicesoundcard.php in GLPI before 9.1.5 via the start parameter. Se presenta una inyección SQL en el archivo front/devicesoundcard.php en GLPI anterior a la versión 9.1.5, por medio del parámetro start. • https://github.com/glpi-project/glpi/issues/2449 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

20 Jul 2017 — GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php. GLPI anterior a versión 9.1.5.1, presenta Inyección SQL en la variable $crit en el archivo inc/computer_softwareversion.class.php, explotable mediante ajax/common.tabs.php. • https://github.com/glpi-project/glpi/issues/2475 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

20 Jul 2017 — GLPI before 9.1.5.1 has SQL Injection in the condition rule field, exploitable via front/rulesengine.test.php. GLPI anterior a versión 9.1.5.1, presenta inyección SQL en el campo condition rule, explotable mediante front/rulesengine.test.php. • https://github.com/glpi-project/glpi/issues/2476 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

14 Jul 2017 — GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers. GLPI anterior a versión 9.1.5, permite la inyección SQL por medio de una petición en el archivo ajax/getDropdownValue.php con un parámetro entity_restrict que no esta en una lista de enteros. • https://github.com/glpi-project/glpi/issues/2456 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 0

05 Oct 2015 — Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/. Carga de archivos sin restricciones en GLPI en versiones anteriores a 0.85.3 permite a usuarios remotos autenticados ejecutar código arbitrario añadiendo un archivo con una extensión ejecutable como un archivo adjunto a un nuevo ticket, accediendo después a ... • http://seclists.org/fulldisclosure/2015/Feb/71 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

05 Oct 2015 — GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php. GLPI en versiones anteriores a 0.85.3 permite a usuarios remotos autenticados crear cuentas de super-admin mediante el aprovechamiento de permisos para crear un usuario y el parámetro _profiles_id para front/user.form.php. • http://seclists.org/fulldisclosure/2015/Feb/71 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Mar 2015 — GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. GLPI anterior a 0.84.7 no restringe correctamente el acceso a la información de costes, lo que permite a atacantes remotos obtener información sensible a través del criterio de costes en la barra de búsqueda. Due to a bug in GLPI before 0.84.7, a user without access to cost information can in fact see the information when selecting c... • http://advisories.mageia.org/MGASA-2015-0017.html • CWE-264: Permissions, Privileges, and Access Controls •