Lucene search

K

5 matches found

CVE
CVE
added 2020/10/07 7:15 p.m.65 views

CVE-2020-15175

In GLPI before version 9.5.2, the ​pluginimage.send.php​ endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. ...

9.1CVSS7.9AI score0.09825EPSS
CVE
CVE
added 2020/10/07 7:15 p.m.56 views

CVE-2020-15177

In GLPI before version 9.5.2, the install/install.php endpoint insecurely stores user input into the database as url_base and url_base_api. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication ...

8CVSS6.6AI score0.00305EPSS
CVE
CVE
added 2020/10/07 7:15 p.m.54 views

CVE-2020-15176

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, perso...

8.7CVSS8.6AI score0.00281EPSS
CVE
CVE
added 2020/10/07 7:15 p.m.53 views

CVE-2020-15217

In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.

5.3CVSS5.4AI score0.00234EPSS
CVE
CVE
added 2020/10/07 8:15 p.m.51 views

CVE-2020-15226

In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scen...

5CVSS5.2AI score0.00293EPSS