First published: Wed Apr 05 2023(Updated: )
The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Glpi-project Order | >=1.8.0<2.7.7 | |
Glpi-project Order | =2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29006 is a vulnerability in the Order GLPI plugin that allows authenticated users to execute a system command by crafting a malicious URL.
CVE-2023-29006 has a severity rating of 8.8 (high).
Versions 1.8.0 to 2.7.7 and version 2.10.0 of the Order GLPI plugin are affected by CVE-2023-29006.
An authenticated user with access to the standard interface can exploit CVE-2023-29006 by crafting a specially-crafted URL to execute a system command.
Yes, you can find references for CVE-2023-29006 at the following links: [link1](https://github.com/pluginsGLPI/order/commit/c78e64b95e54d5e47d9835984c93049f245b579e) and [link2](https://github.com/pluginsGLPI/order/security/advisories/GHSA-xfx2-qx2r-3wwm).