Show plain JSON{"id": "CVE-2012-1037", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2012-07-12T20:55:10.873", "references": [{"url": "http://seclists.org/fulldisclosure/2012/Feb/157", "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016", "source": "cve@mitre.org"}, {"url": "https://forge.indepnet.net/issues/3338", "source": "cve@mitre.org"}, {"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php", "source": "cve@mitre.org"}, {"url": "https://forge.indepnet.net/projects/glpi/versions/685", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2012/Feb/157", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://forge.indepnet.net/issues/3338", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://forge.indepnet.net/projects/glpi/versions/685", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter."}, {"lang": "es", "value": "Una vulnerabilidad de inclusi\u00f3n remota de fichero PHP en front/popup.php en GLPI v0.78 a v0.80.61 permite ejecutar c\u00f3digo PHP de su elecci\u00f3n a usuarios remotos autenticados a trav\u00e9s de una URL en el par\u00e1metro sub_type."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32250F48-9E4B-4F29-8D61-7762DA7F3C25"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5784A35F-A07A-4570-B5AF-41F4BBBE61EA"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCB9B3CD-9741-4620-85E7-9E98D3D08C79"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AA1A5CA-F4D4-451A-92AE-02BBA292515B"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6ECFCF2-7415-4BB2-BFC6-B61E7779C055"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D88E5E6-547E-4E3F-AE0C-B5CC9ECCBD11"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12E8EC22-D5BB-42DD-8FD6-C8C89B2FF749"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2397775-5240-444E-B735-D92621FCAB43"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2007D9F-8CBD-455A-9E48-D69EB8D78C64"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C9D446-A34F-4CA9-9F20-11B0E61E55E4"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C160C2E-709E-4231-9F0F-5B9A1863AA87"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65BD1072-84E8-4B14-9584-35CF02669000"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D55762E-7A45-4E57-A6D8-524D69A8CE9E"}, {"criteria": "cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8F46AEE-EAC9-4771-B2AB-905CBFB67E39"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}