Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15175

Опубликовано: 07 окт. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 6.4
CVSS3: 7.4

Описание

In GLPI before version 9.5.2, the ​pluginimage.send.php​ endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

6.4 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
больше 5 лет назад

In GLPI before version 9.5.2, the `​pluginimage.send.php​` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

CVSS3: 7.4
debian
больше 5 лет назад

In GLPI before version 9.5.2, the `pluginimage.send.php` endpoint allo ...

6.4 Medium

CVSS2

7.4 High

CVSS3

Уязвимость CVE-2020-15175