SQL Injection in GLPI
|Vulnerable Versions:||0.90.2 and probably prior|
|Advisory Publication:||April 8, 2016 [without technical details]|
|Vendor Notification:||April 8, 2016|
|Vendor Fix:||April 11, 2016|
|Public Disclosure:||April 29, 2016|
|Latest Update:||April 12, 2016|
|Vulnerability Type:||SQL Injection [CWE-89]|
|CVSSv2 Base Score:||7.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L]|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered a high-risk SQL injection vulnerability in a popular Information Resource Manager (IRM) system GLPI. IRM systems are usually used for management and audit of software packages, providing ITIL-compliant service desk. The vulnerability allows remote non-authenticated attacker to execute arbitrary SQL queries, read and write data to the application's database and completely compromise the vulnerable system.
|Update to GLPI 0.90.3|
| High-Tech Bridge Advisory HTB23301 - https://www.immuniweb.com/advisory/HTB23301 - SQL Injection in GLPI.|
 GLPI - http://www.glpi-project.org - GLPI is the Information Resource Manager with an additional Administration Interface.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
 ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing.
 ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.