Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2022-34126
The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.003
EPSS Ranking
49.4%
CVSS Severity
CVSS v3 Score
7.5
References
https://github.com/InfotelGLPI/activity/releases/tag/3.1.1
https://github.com/InfotelGLPI/activity/security/advisories/GHSA-jcmw-hpgh-357p
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
https://github.com/InfotelGLPI/activity/releases/tag/3.1.1
https://github.com/InfotelGLPI/activity/security/advisories/GHSA-jcmw-hpgh-357p
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
Products affected by CVE-2022-34126
Glpi-Project
»
Activity
»
Version:
2.4.0
cpe:2.3:a:glpi-project:activity:2.4.0
Glpi-Project
»
Activity
»
Version:
2.5.0
cpe:2.3:a:glpi-project:activity:2.5.0
Glpi-Project
»
Activity
»
Version:
3.0.0
cpe:2.3:a:glpi-project:activity:3.0.0
Glpi-Project
»
Activity
»
Version:
3.1.0
cpe:2.3:a:glpi-project:activity:3.1.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved