// For flags

CVE-2022-35946

SQL injection through plugin controller in GLPI

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.

GLPI son las siglas de Gestionnaire Libre de Parc Informatique y es un paquete de software de administración de activos y TI gratuito, que proporciona funciones de Service Desk de ITIL, seguimiento de licencias y auditoría de software. En las versiones afectadas, la entrada de peticiones no es comprobada apropiadamente en el controlador del plugin y puede usarse para acceder a la API de bajo nivel de la clase del plugin. Un atacante puede, por ejemplo, alterar los datos de la base de datos. El atacante debe tener derechos de actualización "General setup" para poder llevar a cabo este ataque. Es recomendado a usuarios actualizar a versión 10.0.3. Los usuarios que no puedan actualizar deberán eliminar el script "front/plugin.form"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-09-14 CVE Published
  • 2024-04-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Glpi-project
Search vendor "Glpi-project"
Glpi
Search vendor "Glpi-project" for product "Glpi"
< 10.0.3
Search vendor "Glpi-project" for product "Glpi" and version " < 10.0.3"
-
Affected