Details of CVE-2023-28634 impacting GLPI software, allowing Technician profile users to escalate privileges to Super-Admin, posing high risk.
A vulnerability has been identified in GLPI that could allow privilege escalation from Technician to Super-Admin. This CVE poses a significant risk, impacting the confidentiality, integrity, and availability of affected systems.
Understanding CVE-2023-28634
GLPI, a free asset and IT management software package, is found to be vulnerable to privilege escalation from Technician to Super-Admin. The vulnerability exists in versions prior to 9.5.13 and 10.0.7, allowing a user with a Technician profile to generate a Personal token for a Super-Admin. Exploiting this token could lead to session negotiation and hijacking of the Super-Admin account, ultimately resulting in privilege escalation.
What is CVE-2023-28634?
The vulnerability in GLPI allows users with a Technician profile to manipulate a Personal token for a Super-Admin, enabling them to hijack the Super-Admin account and escalate their privileges within the system. Versions 9.5.13 and 10.0.7 have been patched to address this issue.
The Impact of CVE-2023-28634
The impact of CVE-2023-28634 is classified as high, with implications for confidentiality, integrity, and availability. An attacker exploiting this vulnerability could gain unauthorized access to sensitive information, manipulate data integrity, and disrupt system availability.
Technical Details of CVE-2023-28634
The vulnerability in GLPI is categorized under CWE-285 (Improper Authorization) and CWE-863 (Incorrect Authorization). It has a CVSS v3.1 base score of 8.8, indicating a high severity level. The attack complexity is assessed as low, requiring low privileges, and originating from a network vector with high impacts on confidentiality, integrity, and availability.
Vulnerability Description
Within GLPI versions prior to 9.5.13 and 10.0.7, users with a Technician profile can exploit a flaw to generate a Personal token for a Super-Admin, allowing them to escalate their privileges and compromise sensitive functionalities.
Affected Systems and Versions
The vulnerability impacts GLPI versions from >= 0.83 and < 9.5.13, as well as versions >= 10.0.0 and < 10.0.7. Systems running these versions are vulnerable to the privilege escalation issue.
Exploitation Mechanism
By leveraging the ability to generate a Personal token for a Super-Admin, an attacker with a Technician profile can misuse this token to take control of the Super-Admin account and elevate their privileges within the GLPI system.
Mitigation and Prevention
To address CVE-2023-28634 and mitigate the risks associated with the privilege escalation vulnerability in GLPI, organizations and users are advised to take immediate action and implement the following security measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Make sure to apply all relevant patches and updates provided by GLPI to ensure that the privilege escalation vulnerability is remediated and the system remains secure. Regularly check for new releases and security advisories to stay up to date with the latest security enhancements.