CVE-2023-42802

GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:23

Type Values Removed Values Added
References () https://github.com/glpi-project/glpi/releases/tag/10.0.10 - Release Notes () https://github.com/glpi-project/glpi/releases/tag/10.0.10 - Release Notes
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - Vendor Advisory () https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 10.0

09 Nov 2023, 18:39

Type Values Removed Values Added
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Glpi-project glpi
Glpi-project
CWE CWE-20 CWE-434
References (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - (MISC) https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m - Vendor Advisory
References (MISC) https://github.com/glpi-project/glpi/releases/tag/10.0.10 - (MISC) https://github.com/glpi-project/glpi/releases/tag/10.0.10 - Release Notes

02 Nov 2023, 14:26

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-02 14:15

Updated : 2024-11-21 08:23


NVD link : CVE-2023-42802

Mitre link : CVE-2023-42802

CVE.ORG link : CVE-2023-42802


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-20

Improper Input Validation

CWE-434

Unrestricted Upload of File with Dangerous Type