GLPI GLPI Product 9.3.1 is affected by: Cross Site Scripting (XSS). The impact is: All dropdown values are vulnerable to XSS leading to privilege escalation and executing js on admin. The component is: /glpi/ajax/getDropDownValue.php. The attack vector is: 1- User Create a ticket , 2- Admin opens another ticket and click on the "Link Tickets" feature, 3- a request to the endpoint fetches js and executes it.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/blob/9.4/bugfixes/ajax/getDropdownValue.php | Exploit Third Party Advisory |
https://github.com/glpi-project/glpi/releases/tag/9.3.1 | Release Notes Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: dwf
Published: 2019-07-15T17:05:18
Updated: 2019-07-15T17:05:18
Reserved: 2019-03-20T00:00:00
Link: CVE-2019-1010307
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-15T18:15:12.007
Modified: 2019-07-18T13:22:43.300
Link: CVE-2019-1010307
JSON object: View
Redhat Information
No data.
CWE