CVE-2021-43779 – Remote Command Execution vulnerability
https://notcve.org/view.php?id=CVE-2021-43779
GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin. GLPI es un sistema de administración de activos de TI de código abierto, un sistema de seguimiento de incidencias y un sistema de servicio técnico. El plugin de direccionamiento de GLPI en versiones anteriores a 2.9.1, sufre una vulnerabilidad de Ejecución de Código Remota autenticada, que permite acceder al sistema operativo subyacente del servidor mediante el abuso de inyección de comandos. • https://github.com/hansmach1ne/MyExploits/tree/main/RCE_GLPI_addressing_plugin https://github.com/pluginsGLPI/addressing/commit/6f55964803054a5acb5feda92c7c7f1d91ab5366 https://github.com/pluginsGLPI/addressing/security/advisories/GHSA-q5fp-xpr8-77jh • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •