2023-09-29 20:00:28 +00:00

101 lines
3.5 KiB
JSON

{
"id": "CVE-2023-41320",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T15:19:29.297",
"lastModified": "2023-09-29T18:15:45.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Gestionnaire Libre de Parc Informatique (GLPI) es un paquete Gratuito de Software de Gesti\u00f3n de Activos IT, que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditor\u00eda de software. La gesti\u00f3n de preferencias del dise\u00f1o de la interfaz de usuario se puede secuestrar para provocar una inyecci\u00f3n de SQL. Esta inyecci\u00f3n se puede utilizar para hacerse cargo de una cuenta de administrador. Se recomienda a los usuarios que actualicen a la versi\u00f3n 10.0.10. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.10",
"matchCriteriaId": "AC43FDD9-D833-4957-830E-F6557428DB4E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}