CVE-2023-28855 involves unauthorized write access in Fields GLPI plugin prior to versions 1.13.1 and 1.20.4. Learn about impact, mitigation, and updates.
This CVE involves the Fields GLPI plugin being vulnerable to unauthorized write access to additional fields, impacting versions prior to 1.13.1 and 1.20.4.
Understanding CVE-2023-28855
This vulnerability in the Fields GLPI plugin poses a risk as it allows any authenticated user to write data to any fields container, even those to which they do not have configured access. Versions 1.13.1 and 1.20.4 address this security flaw with a patch.
What is CVE-2023-28855?
The CVE-2023-28855 vulnerability affects the Fields GLPI plugin, enabling unauthorized users to write data to additional fields, compromising the integrity of the system.
The Impact of CVE-2023-28855
The impact of this vulnerability is medium severity, with a base score of 6.5 according to the CVSS 3.1 metrics. The integrity of the system is at high risk due to improper privilege management.
Technical Details of CVE-2023-28855
This section provides an in-depth look at the vulnerability, including its description, affected systems, and how it can be exploited.
Vulnerability Description
The vulnerability results from a lack of access control checks in the Fields GLPI plugin, allowing authenticated users to write data to any fields container without proper authorization.
Affected Systems and Versions
The affected systems are those running versions prior to 1.13.1 and between 1.20.0 to 1.20.3 of the Fields GLPI plugin.
Exploitation Mechanism
Attackers can exploit this vulnerability by leveraging the lack of access control checks to manipulate data in fields containers they should not have permissions to modify.
Mitigation and Prevention
To mitigate the risks associated with CVE-2023-28855, users and system administrators should take immediate action and implement long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates