CVE-2012-1037
Published Jul 12, 2012
Last updated 12 years ago
Overview
- Description
- PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32250F48-9E4B-4F29-8D61-7762DA7F3C25" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5784A35F-A07A-4570-B5AF-41F4BBBE61EA" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCB9B3CD-9741-4620-85E7-9E98D3D08C79" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AA1A5CA-F4D4-451A-92AE-02BBA292515B" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6ECFCF2-7415-4BB2-BFC6-B61E7779C055" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D88E5E6-547E-4E3F-AE0C-B5CC9ECCBD11" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12E8EC22-D5BB-42DD-8FD6-C8C89B2FF749" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2397775-5240-444E-B735-D92621FCAB43" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2007D9F-8CBD-455A-9E48-D69EB8D78C64" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C9D446-A34F-4CA9-9F20-11B0E61E55E4" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C160C2E-709E-4231-9F0F-5B9A1863AA87" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65BD1072-84E8-4B14-9584-35CF02669000" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D55762E-7A45-4E57-A6D8-524D69A8CE9E" }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8F46AEE-EAC9-4771-B2AB-905CBFB67E39" } ], "operator": "OR" } ] } ]