Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35946 Explained : Impact and Mitigation

Learn about CVE-2022-35946, a SQL injection vulnerability in GLPI's plugin controller. Upgrade to version 10.0.3 or remove the affected script to protect your systems.

GLPI, a Free Asset and IT Management Software, is affected by a SQL injection vulnerability through its plugin controller. Attackers with 'General setup' update rights can exploit this issue to access low-level API of the Plugin class and alter database data. Users are advised to upgrade to version 10.0.3 or remove the

front/plugin.form.php
script to mitigate the risk.

Understanding CVE-2022-35946

This section provides insights into the impact and technical details of the SQL injection vulnerability in GLPI.

What is CVE-2022-35946?

CVE-2022-35946 is a vulnerability in GLPI's plugin controller that allows attackers to manipulate database data by exploiting the improper validation of request input.

The Impact of CVE-2022-35946

The vulnerability carries a CVSS base score of 5.5 (Medium severity) with high confidentiality impact, low integrity impact, and high privileges required. The attack complexity is low, and user interaction is not needed.

Technical Details of CVE-2022-35946

This section delves deeper into the technical aspects of the vulnerability.

Vulnerability Description

In affected versions of GLPI, the plugin controller fails to validate request input properly, enabling attackers to access the low-level API of the Plugin class and tamper with database data.

Affected Systems and Versions

GLPI versions >= 0.72 and < 10.0.3 are impacted by this vulnerability.

Exploitation Mechanism

Attackers with 'General setup' update rights can utilize the vulnerability to conduct SQL injection attacks through the plugin controller.

Mitigation and Prevention

Protecting systems from CVE-2022-35946 entails taking immediate action and adopting long-term security practices.

Immediate Steps to Take

Users are strongly advised to upgrade their GLPI installations to version 10.0.3. If upgrading is not feasible, removing the

front/plugin.form.php
script can help mitigate the risk.

Long-Term Security Practices

Incorporating secure coding practices, regular security audits, and user permission restriction strategies can enhance the overall security posture.

Patching and Updates

Staying informed about security advisories from GLPI and promptly applying patches and updates is crucial to defend against emerging threats.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now