Learn about CVE-2020-26212 affecting GLPI versions before 9.5.3. Unauthorized users could access CalDAV calendars. Mitigation steps and impact details included.
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package. In GLPI before version 9.5.3, a vulnerability allowed any authenticated user to have read-only permissions to other users' planning, including admin users.
Understanding CVE-2020-26212
This CVE describes a security issue in GLPI versions prior to 9.5.3 that granted unauthorized read-only access to CalDAV calendars.
What is CVE-2020-26212?
In GLPI versions before 9.5.3, any authenticated user could access and view other users' planning, even if they were admin users. This unauthorized access posed a significant security risk.
The Impact of CVE-2020-26212
The vulnerability had a CVSS base score of 7.7, indicating a high severity issue. It allowed for high confidentiality impact, low privileges required, and no user interaction needed for exploitation.
Technical Details of CVE-2020-26212
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability in GLPI versions prior to 9.5.3 allowed any authenticated user to have read-only access to other users' planning, including admin users.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from this vulnerability is crucial to maintaining security.
Immediate Steps to Take
caldav.php
file as a workaround to block access to the CalDAV server.Long-Term Security Practices
Patching and Updates