CVE-2020-11033

Published May 5, 2020

Last updated a year ago

Overview

Description
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
Source
security-advisories@github.com
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
7.2
Impact score
5.9
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
6
Impact score
6.4
Exploitability score
6.8
Vector string
AV:N/AC:M/Au:S/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-200
security-advisories@github.com
CWE-200

Social media

Hype score
Not currently trending

Configurations