First published: Wed Sep 14 2022(Updated: )
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI-PROJECT GLPI | <10.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35947 is a vulnerability in GLPI, a Free Asset and IT Management Software package, that allows for a SQL injection attack.
CVE-2022-35947 has a severity rating of 9.8 out of 10, making it critical.
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package.
A SQL injection attack is a type of security vulnerability that allows an attacker to manipulate a database by injecting malicious SQL statements.
To fix CVE-2022-35947, you should update your GLPI software to version 10.0.4 or later, following the official patch provided by GLPI-PROJECT.