CVE-2022-36112 – Blind Server-Side Request Forgery (SSRF) in GLPI
https://notcve.org/view.php?id=CVE-2022-36112
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. • https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2022-35945 – Cross site scripting (XSS) via registration API in GLPI
https://notcve.org/view.php?id=CVE-2022-35945
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person. • https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-31143 – Leak of sensitive information through login page error in GLPI
https://notcve.org/view.php?id=CVE-2022-31143
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue. • https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978 https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-24868 – Cross site scripting via SVG file upload in GLPI
https://notcve.org/view.php?id=CVE-2022-24868
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars. • https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24867 – LDAP password exposure in glpi
https://notcve.org/view.php?id=CVE-2022-24867
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue. • https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •