GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
References
Configurations
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html - | |
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg - Third Party Advisory |
07 Jul 2022, 16:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
CWE | CWE-89 | |
References | (CONFIRM) https://github.com/glpi-project/glpi/security/advisories/GHSA-9q9x-7xxh-w4cg - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
28 Jun 2022, 18:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-28 18:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-31056
Mitre link : CVE-2022-31056
CVE.ORG link : CVE-2022-31056
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')