7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.019 Low
EPSS
Percentile
88.3%
GLPI is an open-source asset and IT management software package that
provides ITIL Service Desk features, licenses tracking and software
auditing. In GLPI before version 9.5.4 non-authenticated user can remotely
instantiate object of any class existing in the GLPI environment that can
be used to carry out malicious attacks, or to start a βPOP chainβ. As an
example of direct impact, this vulnerability affects integrity of the GLPI
core platform and third-party plugins runtime misusing classes which
implement some sensitive operations in their constructors or destructors.
This is fixed in version 9.5.4.
packetstormsecurity.com/files/161680/GLPI-9.5.3-Unsafe-Reflection.html
github.com/glpi-project/glpi/releases/tag/9.5.4
github.com/glpi-project/glpi/security/advisories/GHSA-qmw7-w2m4-rjwp
launchpad.net/bugs/cve/CVE-2021-21327
nvd.nist.gov/vuln/detail/CVE-2021-21327
security-tracker.debian.org/tracker/CVE-2021-21327
www.cve.org/CVERecord?id=CVE-2021-21327
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.019 Low
EPSS
Percentile
88.3%