// For flags

CVE-2024-28240

GLPI-Agent's MSI package installation permits local users to change Agent configuration

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

The GLPI Agent is a generic management agent. A vulnerability that only affects GLPI-Agent installed on windows via MSI packaging can allow a local user to cause denial of agent service by replacing GLPI server url with a wrong url or disabling the service. Additionally, in the case the Deploy task is installed, a local malicious user can trigger privilege escalation configuring a malicious server providing its own deploy task payload. GLPI-Agent 1.7.2 contains a patch for this issue. As a workaround, edit GLPI-Agent related key under `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall` and add `SystemComponent` DWORD value setting it to `1` to hide GLPI-Agent from installed applications.

El Agente GLPI es un agente de gestión genérico. Una vulnerabilidad que solo afecta al GLPI-Agent instalado en Windows a través del paquete MSI puede permitir que un usuario local provoque la denegación del servicio del agente reemplazando la URL del servidor GLPI con una URL incorrecta o deshabilitando el servicio. Además, en el caso de que se instale la tarea de implementación, un usuario malicioso local puede desencadenar una escalada de privilegios configurando un servidor malicioso que proporcione su propio payload de la tarea de implementación. GLPI-Agent 1.7.2 contiene un parche para este problema. Como workaround, edite la clave relacionada con GLPI-Agent en `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall` y agregue el valor DWORD `SystemComponent` configurándolo en `1` para ocultar GLPI-Agent de las aplicaciones instaladas.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-03-07 CVE Reserved
  • 2024-04-25 CVE Published
  • 2024-04-26 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Glpi-project
Search vendor "Glpi-project"
Glpi-agent
Search vendor "Glpi-project" for product "Glpi-agent"
< 1.7.2
Search vendor "Glpi-project" for product "Glpi-agent" and version " < 1.7.2"
en
Affected