/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?&Sfs=htmLawedTest.php&Sl=.%2Finternal_utilities%2FhtmLawed | third party advisory patch |
https://github.com/glpi-project/glpi/releases | third party advisory release notes |
https://glpi-project.org/fr/glpi-10-0-3-disponible/ | release notes vendor advisory |
http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html | exploit vdb entry third party advisory |
https://github.com/Orange-Cyberdefense/CVE-repository/ | third party advisory |
https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_2022-35914.sh | exploit |
https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/ | third party advisory exploit |