The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pluginsGLPI/order/commit/c78e64b95e54d5e47d9835984c93049f245b579e - Patch | |
References | () https://github.com/pluginsGLPI/order/security/advisories/GHSA-xfx2-qx2r-3wwm - Vendor Advisory |
12 Apr 2023, 15:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Glpi-project
Glpi-project order |
|
CPE | cpe:2.3:a:glpi-project:order:*:*:*:*:*:glpi:*:* cpe:2.3:a:glpi-project:order:2.10.0:*:*:*:*:glpi:*:* |
|
References | (MISC) https://github.com/pluginsGLPI/order/commit/c78e64b95e54d5e47d9835984c93049f245b579e - Patch | |
References | (MISC) https://github.com/pluginsGLPI/order/security/advisories/GHSA-xfx2-qx2r-3wwm - Vendor Advisory |
05 Apr 2023, 18:47
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-05 18:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29006
Mitre link : CVE-2023-29006
CVE.ORG link : CVE-2023-29006
JSON object : View
Products Affected
glpi-project
- order
CWE
CWE-502
Deserialization of Untrusted Data