First published: Wed Sep 14 2022(Updated: )
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI | <10.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35946 is a vulnerability in GLPI, a Free Asset and IT Management Software package, that allows attackers to inject malicious input in the plugin controller.
CVE-2022-35946 has a severity rating of 6.5, which is considered medium.
CVE-2022-35946 can be exploited by manipulating the plugin controller to send malicious input.
CVE-2022-35946 affects GLPI versions up to and excluding 10.0.3.
To fix CVE-2022-35946, update GLPI to a version that includes the fix mentioned in the reference links provided.