First published: Mon Mar 12 2018(Updated: )
A remote code execution issue was discovered in GLPI through 9.2.1. There is a race condition that allows temporary access to an uploaded executable file that will be disallowed. The application allows an authenticated user to upload a file when he/she creates a new ticket via front/fileupload.php. This feature is protected using different types of security features like the check on the file's extension. However, the application uploads and creates a file, though this file is not allowed, and then deletes the file in the uploadFiles method in inc/glpiuploaderhandler.class.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teclib GLPI | <=9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7562 has a severity rating that allows for remote code execution, making it a critical vulnerability.
To fix CVE-2018-7562, upgrade GLPI to version 9.2.2 or later.
CVE-2018-7562 affects all GLPI versions up to and including 9.2.1.
CVE-2018-7562 requires authentication, so it cannot be exploited by unauthenticated users.
CVE-2018-7562 is a remote code execution vulnerability caused by a race condition enabling temporary access to an uploaded executable file.