Bug 2247699 (CVE-2023-42802) - CVE-2023-42802 glpi: unrestricted php script upload & execution
Summary: CVE-2023-42802 glpi: unrestricted php script upload & execution
Keywords:
Status: NEW
Alias: CVE-2023-42802
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2247700
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-11-02 19:37 UTC by Anten Skrabec
Modified: 2023-11-02 19:37 UTC (History)
0 users

Fixed In Version: glpi 10.0.10
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Anten Skrabec 2023-11-02 19:37:18 UTC
GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.

https://github.com/glpi-project/glpi/releases/tag/10.0.10
https://github.com/glpi-project/glpi/security/advisories/GHSA-rrh2-x4ch-pq3m

Comment 1 Anten Skrabec 2023-11-02 19:37:29 UTC
Created glpi tracking bugs for this issue:

Affects: epel-all [bug 2247700]


Note You need to log in before you can comment on or make changes to this bug.