Learn about CVE-2022-35946, a SQL injection vulnerability in GLPI's plugin controller. Upgrade to version 10.0.3 or remove the affected script to protect your systems.
GLPI, a Free Asset and IT Management Software, is affected by a SQL injection vulnerability through its plugin controller. Attackers with 'General setup' update rights can exploit this issue to access low-level API of the Plugin class and alter database data. Users are advised to upgrade to version 10.0.3 or remove the
front/plugin.form.php
script to mitigate the risk.
Understanding CVE-2022-35946
This section provides insights into the impact and technical details of the SQL injection vulnerability in GLPI.
What is CVE-2022-35946?
CVE-2022-35946 is a vulnerability in GLPI's plugin controller that allows attackers to manipulate database data by exploiting the improper validation of request input.
The Impact of CVE-2022-35946
The vulnerability carries a CVSS base score of 5.5 (Medium severity) with high confidentiality impact, low integrity impact, and high privileges required. The attack complexity is low, and user interaction is not needed.
Technical Details of CVE-2022-35946
This section delves deeper into the technical aspects of the vulnerability.
Vulnerability Description
In affected versions of GLPI, the plugin controller fails to validate request input properly, enabling attackers to access the low-level API of the Plugin class and tamper with database data.
Affected Systems and Versions
GLPI versions >= 0.72 and < 10.0.3 are impacted by this vulnerability.
Exploitation Mechanism
Attackers with 'General setup' update rights can utilize the vulnerability to conduct SQL injection attacks through the plugin controller.
Mitigation and Prevention
Protecting systems from CVE-2022-35946 entails taking immediate action and adopting long-term security practices.
Immediate Steps to Take
Users are strongly advised to upgrade their GLPI installations to version 10.0.3. If upgrading is not feasible, removing the
front/plugin.form.php
script can help mitigate the risk.
Long-Term Security Practices
Incorporating secure coding practices, regular security audits, and user permission restriction strategies can enhance the overall security posture.
Patching and Updates
Staying informed about security advisories from GLPI and promptly applying patches and updates is crucial to defend against emerging threats.