Learn about CVE-2020-15177, an unauthenticated stored XSS vulnerability in GLPI allowing attackers to execute malicious scripts. Find out the impact, affected systems, and mitigation steps.
In GLPI before version 9.5.2, the
install/install.php
endpoint insecurely stores user input into the database as url_base
and url_base_api
, leading to potential Cross-Site Scripting vulnerabilities. This issue allows attackers to execute malicious scripts and perform actions on behalf of users.
Understanding CVE-2020-15177
What is CVE-2020-15177?
CVE-2020-15177 is an unauthenticated stored Cross-Site Scripting (XSS) vulnerability in GLPI, allowing attackers to inject and execute malicious scripts.
The Impact of CVE-2020-15177
The vulnerability has a CVSS base score of 8 (High), with high impacts on confidentiality, integrity, and user interaction. Attackers can exploit this flaw to steal sensitive information and perform unauthorized actions.
Technical Details of CVE-2020-15177
Vulnerability Description
Insecure storage of user input in
url_base
and url_base_api
in GLPI versions prior to 9.5.2 allows for unauthenticated stored XSS attacks.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates