front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
References
Link | Resource |
---|---|
https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3 | Third Party Advisory |
https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f | Third Party Advisory |
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ | Third Party Advisory |
https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3 | Third Party Advisory |
https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f | Third Party Advisory |
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ | Third Party Advisory |
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ | Third Party Advisory |
Configurations
History
06 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
References | () https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/ - Third Party Advisory |
Information
Published : 2023-04-16 03:15
Updated : 2025-02-06 19:15
NVD link : CVE-2022-34125
Mitre link : CVE-2022-34125
CVE.ORG link : CVE-2022-34125
JSON object : View
Products Affected
glpi-project
- cmdb