First published: Wed Apr 05 2023(Updated: )
GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI-PROJECT GLPI | >=0.50<9.5.13 | |
GLPI-PROJECT GLPI | >=10.0.0<10.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28838 is a SQL Injection vulnerability in GLPI software that allows users with access to statistics or reports to extract all data from the database and potentially write a webshell on the server.
CVE-2023-28838 has a severity rating of 8.1 out of 10, which is considered critical.
GLPI versions 0.50 to 9.5.13 and versions 10.0.0 to 10.0.7 are affected by CVE-2023-28838.
To fix CVE-2023-28838, it is recommended to upgrade GLPI to version 9.5.13 or 10.0.7 or later, which includes the necessary security patches.
You can find more information about CVE-2023-28838 in the following references: [Link 1](https://github.com/glpi-project/glpi/releases/tag/10.0.7), [Link 2](https://github.com/glpi-project/glpi/releases/tag/9.5.13), [Link 3](https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f)