CVE-2022-24867

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

03 May 2022, 13:26

Type Values Removed Values Added
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
References (MISC) https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e - (MISC) https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e - Patch, Third Party Advisory
References (CONFIRM) https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr - (CONFIRM) https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr - Third Party Advisory
CWE CWE-522
CVSS v2 : unknown
v3 : unknown
v2 : 7.8
v3 : 7.5

21 Apr 2022, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-21 17:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-24867

Mitre link : CVE-2022-24867

CVE.ORG link : CVE-2022-24867


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-522

Insufficiently Protected Credentials

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor