Vulnerability Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Glpi-Project | Glpi | < 10.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f05PatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2Third Party Advisory
- https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f05PatchThird Party Advisory
- https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2Third Party Advisory
FAQ
What is CVE-2022-35946?
CVE-2022-35946 is a vulnerability with a CVSS score of 5.5 (MEDIUM). GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In af...
How severe is CVE-2022-35946?
CVE-2022-35946 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-35946?
Check the references section above for vendor advisories and patch information. Affected products include: Glpi-Project Glpi.