CVE-2023-29006
Published Apr 5, 2023
Last updated 2 years ago
Overview
- Description
- The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- security-advisories@github.com
- CWE-502
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:glpi-project:order:*:*:*:*:*:glpi:*:*", "vulnerable": true, "matchCriteriaId": "09602A38-560F-4C72-8933-63F97DA318D9", "versionEndExcluding": "2.7.7", "versionStartIncluding": "1.8.0" }, { "criteria": "cpe:2.3:a:glpi-project:order:2.10.0:*:*:*:*:glpi:*:*", "vulnerable": true, "matchCriteriaId": "88E31548-BD8B-46ED-8CD9-48F1E615369A" } ], "operator": "OR" } ] } ]