Unrated severityNVD Advisory· Published May 12, 2020· Updated Aug 4, 2024
Remote Code Execution in GLPI
CVE-2020-11060
Description
In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.
Affected products
1- Range: < 9.4.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/163119/GLPI-9.4.5-Remote-Code-Execution.htmlmitrex_refsource_MISC
- github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320cmitrex_refsource_MISC
- github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6fmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.