First published: Wed Sep 25 2019(Updated: )
GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teclib GLPI | <=9.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14666 is considered a critical vulnerability due to its potential for account takeover.
To fix CVE-2019-14666, update GLPI to a version later than 9.4.3 where the issue has been addressed.
CVE-2019-14666 allows an authenticated attacker to reset passwords for any user, leading to unauthorized access.
CVE-2019-14666 affects all versions of GLPI up to and including 9.4.3.
CVE-2019-14666 is caused by insufficient validation in the ajax/autocompletion.php feature during password recovery.