First published: Thu Apr 08 2021(Updated: )
GLPi 9.5.4 does not sanitize the metadata. This is way its possible to insert XSS into plugins to execute JavaScript code. References: <a href="https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS">https://github.com/Kitsun3Sec/exploits/tree/master/cms/GLPI/GLPI-stored-XSS</a> <a href="https://n3k00n3.github.io/blog/09042021/glpi_xss.html">https://n3k00n3.github.io/blog/09042021/glpi_xss.html</a>
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glpi | <9.5.5 | 9.5.5 |
Teclib GLPI | =9.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3486 is classified as a medium severity vulnerability due to its ability to execute JavaScript code via stored XSS in GLPi.
To fix CVE-2021-3486, upgrade GLPi to version 9.5.5 or higher, which addresses the XSS vulnerability.
The affected version for CVE-2021-3486 is GLPi 9.5.4, which contains the vulnerability.
Yes, CVE-2021-3486 can impact plugins within GLPi as it allows the injection of malicious JavaScript code.
CVE-2021-3486 can facilitate cross-site scripting (XSS) attacks, potentially compromising user data and session information.