First published: Sun Apr 16 2023(Updated: )
The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Glpi-project Activity | <3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34126 is a vulnerability in the Activity plugin before version 3.1.1 for GLPI which allows reading local files via directory traversal.
CVE-2022-34126 affects GLPI by allowing an attacker to read local files via directory traversal in the front/cra.send.php file parameter.
CVE-2022-34126 has a severity rating of high with a score of 7.5.
To fix CVE-2022-34126, you should upgrade to version 3.1.1 or later of the Activity plugin for GLPI.
You can find more information about CVE-2022-34126 at the following references: [Link 1](https://github.com/InfotelGLPI/activity/releases/tag/3.1.1), [Link 2](https://github.com/InfotelGLPI/activity/security/advisories/GHSA-jcmw-hpgh-357p), [Link 3](https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/).