{ "id": "CVE-2022-34127", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.370", "lastModified": "2023-04-17T13:12:43.170", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Managentities plugin before 4.0.2 for GLPI allows reading local files via directory traversal in the inc/cri.class.php file parameter." } ], "metrics": {}, "references": [ { "url": "https://github.com/InfotelGLPI/manageentities/releases/tag/4.0.2", "source": "cve@mitre.org" }, { "url": "https://github.com/InfotelGLPI/manageentities/security/advisories/GHSA-4hpg-m8fv-xv3h", "source": "cve@mitre.org" }, { "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", "source": "cve@mitre.org" } ] }