Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-11033

Опубликовано: 05 мая 2020
Источник: nvd
CVSS3: 6.6
CVSS3: 7.2
CVSS2: 6
EPSS Низкий

Описание

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
Версия от 9.1 (включая) до 9.4.6 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

EPSS

Процентиль: 63%
0.00446
Низкий

6.6 Medium

CVSS3

7.2 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-200
CWE-200

Связанные уязвимости

CVSS3: 6.6
ubuntu
почти 6 лет назад

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

CVSS3: 6.6
debian
почти 6 лет назад

In GLPI from version 9.1 and before version 9.4.6, any API user with R ...

EPSS

Процентиль: 63%
0.00446
Низкий

6.6 Medium

CVSS3

7.2 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-200
CWE-200