Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11060

Опубликовано: 12 мая 2020
Источник: debian
EPSS Низкий

Описание

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glpiremovedpackage

Примечания

  • https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f

  • https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c

  • Only supported behind an authenticated HTTP zone

EPSS

Процентиль: 91%
0.07013
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 5 лет назад

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

CVSS3: 7.4
nvd
больше 5 лет назад

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

EPSS

Процентиль: 91%
0.07013
Низкий