GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.