SB2022112103 - Multiple vulnerabilities in GLPI
Published: November 21, 2022 Updated: December 2, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2022-39375)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within public RSS feed. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Insufficient Session Expiration (CVE-ID: CVE-2022-39234)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insufficient session expiration issue. A local administrator can continue to use his account as long as its cookie is valid, even if the account is deleted/deactivated.
3) Input validation error (CVE-ID: CVE-2022-39376)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input on emails links. A remote user can inject custom fields values in mailto links.
4) Stored cross-site scripting (CVE-ID: CVE-2022-39262)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data on login page. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) SQL injection (CVE-ID: CVE-2022-39323)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in api REST user_token. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
6) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2022-39276)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in RSS feeds and planning. A remote user can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
7) Cross-site scripting (CVE-ID: CVE-2022-39277)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in external links. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Stored cross-site scripting (CVE-ID: CVE-2022-39372)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in user information. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Stored cross-site scripting (CVE-ID: CVE-2022-39371)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within asset inventory. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
10) Stored cross-site scripting (CVE-ID: CVE-2022-39373)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in entity name. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Improper Privilege Management (CVE-ID: CVE-2022-39370)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to improper privilege management. A remote user can gain unauthorized access to the debug panel through the GLPI update script install/update.php.
Remediation
Install update from vendor's website.
References
- https://github.com/glpi-project/glpi/security/advisories/GHSA-fxcx-93fq-8r9g
- https://github.com/glpi-project/glpi/releases/tag/9.5.10
- https://github.com/glpi-project/glpi/releases/tag/10.0.4
- https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg
- https://github.com/glpi-project/glpi/security/advisories/GHSA-6rh5-m5g7-327w
- https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4x48-q2wr-cpg4
- https://github.com/glpi-project/glpi/security/advisories/GHSA-cp6q-9p4x-8hr9
- https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/
- https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p
- https://github.com/glpi-project/glpi/security/advisories/GHSA-rhcw-8r7g-8pwc
- https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/
- https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2
- https://github.com/glpi-project/glpi/security/advisories/GHSA-w7wc-728f-6mm8
- https://github.com/glpi-project/glpi/security/advisories/GHSA-cw37-q82c-w546