Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11033
HistoryMay 05, 2020 - 9:15 p.m.

CVE-2020-11033 Able to read any token through API user endpoint in GLPI

2020-05-0521:15:12
CWE-200
GitHub_M
www.cve.org
1

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.5%

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

CNA Affected

[
  {
    "product": "GLPI",
    "vendor": "glpi-project",
    "versions": [
      {
        "status": "affected",
        "version": ">9.1, < 9.4.6"
      }
    ]
  }
]

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.5%