First published: Thu Nov 02 2023(Updated: )
GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GLPI-PROJECT GLPI | >=10.0.7<10.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42802 is a vulnerability in GLPI, a free asset and IT management software package, that allows unallowed PHP script execution.
CVE-2023-42802 has a severity level of critical with a score of 10.
CVE-2023-42802 affects GLPI versions 10.0.7 to 10.0.10, allowing unverified object instantiation and the upload of malicious PHP files to unwanted directories.
To fix CVE-2023-42802, update your GLPI installation to version 10.0.10 or later.
You can find more information about CVE-2023-42802 in the advisory on the GLPI GitHub repository and in the release notes for GLPI version 10.0.10.