Latest from our blog
Remote Code Execution in GLPI
|Vulnerable Versions:||0.84.1 and probably prior|
|Advisory Publication:||September 11, 2013 [without technical details]|
|Vendor Notification:||September 11, 2013|
|Vendor Fix:||September 12, 2013|
|Public Disclosure:||October 2, 2013|
|Latest Update:||September 13, 2013|
|Vulnerability Type:||Improper Access Control [CWE-284]|
Code Injection [CWE-94]
|CVSSv2 Base Scores:||6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in GLPI, which can be exploited to bypass security restrictions and execute arbitrary PHP code with privileges of web server.
|Update to GLPI 0.84.2|
| High-Tech Bridge Advisory HTB23173 - https://www.htbridge.com/advisory/HTB23173 - Multiple Vulnerabilities in GLPI.|
 GLPI - http://www.glpi-project.org - GLPI is the Information Resource-Manager with an additional Administration-Interface.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® - a PCI compliant web application penetration test combined with managed vulnerability scan. Configure, schedule, and manage online 24/7.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.