Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11033

Опубликовано: 05 мая 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6
CVSS3: 6.6

Описание

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

EPSS

Процентиль: 63%
0.00446
Низкий

6 Medium

CVSS2

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.6
nvd
почти 6 лет назад

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

CVSS3: 6.6
debian
почти 6 лет назад

In GLPI from version 9.1 and before version 9.4.6, any API user with R ...

EPSS

Процентиль: 63%
0.00446
Низкий

6 Medium

CVSS2

6.6 Medium

CVSS3