CVE-2020-11033
Able to read any token through API user endpoint in GLPI
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
En GLPI desde la versión 9.1 y versiones anteriores a 9.4.6, cualquier usuario de la API con derecho READ en el tipo de elemento User tendrá acceso a la lista completa de usuarios cuando consulte apirest.php/User. La respuesta contiene: - Todos los api_tokens los cuales pueden ser usados para escalar privilegios o leer/actualizar/eliminar datos que normalmente no son accesibles para el usuario actual. - Todos los tokens personales pueden mostrar la planificación de otros usuarios. La explotación de esta vulnerabilidad requiere que la API esté habilitada y una cuenta de técnico. Puede ser mitigada al agregar un token de aplicación. Esto es corregido en la versión 9.4.6.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-30 CVE Reserved
- 2020-05-05 CVE Published
- 2023-11-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | >= 9.1 < 9.4.6 Search vendor "Glpi-project" for product "Glpi" and version " >= 9.1 < 9.4.6" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
|