Learn about CVE-2022-24867, a high-severity vulnerability in GLPI exposing LDAP passwords. Upgrade to version 10.0.0 to mitigate the risk.
This article provides details about CVE-2022-24867, a vulnerability in GLPI that exposes LDAP passwords to unauthorized actors.
Understanding CVE-2022-24867
GLPI, a free Asset and IT Management Software, is affected by this vulnerability where LDAP passwords can be exposed when passing config to JavaScript.
What is CVE-2022-24867?
GLPI software, specifically versions below 10.0.0, allows for the exposure of sensitive information, particularly LDAP passwords, to unauthorized actors. This critical vulnerability poses a high risk to the confidentiality of sensitive data.
The Impact of CVE-2022-24867
The impact of CVE-2022-24867 is rated as high severity with a CVSS base score of 7.5. Attackers with network access can exploit this vulnerability to gain unauthorized access to LDAP passwords, compromising the confidentiality of sensitive information.
Technical Details of CVE-2022-24867
This section provides more technical insights into the vulnerability.
Vulnerability Description
When certain entries are filtered out in GLPI's JavaScript configuration, the variable 'ldap_pass' remains unfiltered, leading to the exposure of the password for the root dn in the rendered page source code.
Affected Systems and Versions
GLPI versions below 10.0.0 are impacted by this vulnerability, making them susceptible to LDAP password exposure.
Exploitation Mechanism
The vulnerability can be exploited by malicious actors with network access to view LDAP passwords by examining the source code of the rendered GLPI pages.
Mitigation and Prevention
To address CVE-2022-24867 and enhance cybersecurity, users are advised to take immediate and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Implement additional security measures such as regular security audits and code reviews to prevent similar vulnerabilities in the future.
Patching and Updates
Stay informed about security advisories from GLPI and promptly apply patches and updates to ensure the security of the software.