{ "id": "CVE-2022-34125", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.280", "lastModified": "2023-04-17T13:12:43.170", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter." } ], "metrics": {}, "references": [ { "url": "https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3", "source": "cve@mitre.org" }, { "url": "https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f", "source": "cve@mitre.org" }, { "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", "source": "cve@mitre.org" } ] }