7.6 High
AI Score
Confidence
Low
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
78.9%
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
CPE | Name | Operator | Version |
---|---|---|---|
glpi-project:glpi | glpi-project glpi | le | 0.85 |
advisories.mageia.org/MGASA-2015-0017.html
lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html
lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html
lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html
osvdb.org/show/osvdb/115957
secunia.com/advisories/61367
security.szurek.pl/glpi-085-blind-sql-injection.html
www.exploit-db.com/exploits/35528
www.glpi-project.org/spip.php?page=annonce&id_breve=334&lang=en
www.mandriva.com/security/advisories?name=MDVSA-2015:167