CVE-2023-29006

high

Description

The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the `ajax/dropdownContact.php` file from the plugin.

References

https://github.com/pluginsGLPI/order/security/advisories/GHSA-xfx2-qx2r-3wwm

https://github.com/pluginsGLPI/order/commit/c78e64b95e54d5e47d9835984c93049f245b579e

Details

Source: Mitre, NVD

Published: 2023-04-05

Updated: 2023-04-12

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High