Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11060
HistoryMay 12, 2020 - 7:30 p.m.

CVE-2020-11060 Remote Code Execution in GLPI

2020-05-1219:30:14
CWE-74
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.9%

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

CNA Affected

[
  {
    "product": "GLPI",
    "vendor": "glpi-project",
    "versions": [
      {
        "status": "affected",
        "version": "< 9.4.6"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.9%