An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute arbitrary code via the insufficient validation of user-supplied input.
References
Configurations
No configuration.
History
04 Nov 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 09:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/V3locidad/GLPI_POC_Plugins_Shell - | |
| References | () https://seclists.org/fulldisclosure/2024/Apr/23 - |
20 Aug 2024, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-78 | |
| Summary |
|
29 Apr 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-29 18:15
Updated : 2025-11-04 19:17
NVD link : CVE-2024-31705
Mitre link : CVE-2024-31705
CVE.ORG link : CVE-2024-31705
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
