CVE-2013-2226
GLPI 0.83.8 - Multiple Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
Múltiples vulnerabilidades de inyección SQL en GLPI anterior a 0.83.9 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro (1) users_id_assign en ajax/ticketassigninformation.php, (2) filename en front/document.form.php o (3) table en ajax/comments.php.
Multiple security vulnerabilities exist due to improper sanitation of user input in GLPI versions prior to 0.83.9, 0.83.91, and 0.84.2. This update provides GLPI version 0.83.91, with a patch from GLPI 0.84.2, to fix these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-06-21 First Exploit
- 2013-09-25 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/26366 | 2013-06-21 | |
http://www.securityfocus.com/bid/60693 | 2024-08-06 | |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves= | 2014-05-15 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | <= 0.83.8 Search vendor "Glpi-project" for product "Glpi" and version " <= 0.83.8" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83 Search vendor "Glpi-project" for product "Glpi" and version "0.83" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.1 Search vendor "Glpi-project" for product "Glpi" and version "0.83.1" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.2 Search vendor "Glpi-project" for product "Glpi" and version "0.83.2" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.3 Search vendor "Glpi-project" for product "Glpi" and version "0.83.3" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.4 Search vendor "Glpi-project" for product "Glpi" and version "0.83.4" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.5 Search vendor "Glpi-project" for product "Glpi" and version "0.83.5" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.6 Search vendor "Glpi-project" for product "Glpi" and version "0.83.6" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.7 Search vendor "Glpi-project" for product "Glpi" and version "0.83.7" | - |
Affected
| ||||||
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | 0.83.31 Search vendor "Glpi-project" for product "Glpi" and version "0.83.31" | - |
Affected
|