GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 | third party advisory mitigation |
https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326 | third party advisory patch |
https://github.com/glpi-project/glpi/releases/tag/9.5.7 | third party advisory release notes |