Vulnerabilities
Vulnerable Software
Glpi-Project:  >> Glpi  >> 0.83.7  Security Vulnerabilities
Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
CVSS Score
7.5
EPSS Score
0.026
Published
2014-05-14
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
CVSS Score
6.8
EPSS Score
0.64
Published
2013-09-23


Contact Us

Shodan ® - All rights reserved