Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-37149
HistoryJul 10, 2024 - 7:20 p.m.

CVE-2024-37149 GLPI allows remote code execution through the plugin loader

2024-07-1019:20:36
CWE-73
GitHub_M
github.com
3
glpi
remote code execution
plugin loader
upgrade

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated technician user can upload a malicious PHP script and hijack the plugin loader to execute this malicious script. Upgrade to 10.0.16.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:glpi-project:glpi:0.85:*:*:*:*:*:*:*"
    ],
    "vendor": "glpi-project",
    "product": "glpi",
    "versions": [
      {
        "status": "affected",
        "version": "0.85",
        "lessThan": "10.0.16",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-37149