Unrated severityNVD Advisory· Published May 5, 2020· Updated Aug 4, 2024
Able to read any token through API user endpoint in GLPI
CVE-2020-11033
Description
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
Affected products
1- Range: >9.1, < 9.4.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/mitrevendor-advisoryx_refsource_FEDORA
- github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.