[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] CVE-2024-31705
From:       V3locidad <v3locidad () v3locidad ! com>
Date:       2024-04-11 19:28:12
Message-ID: 34536CF3-B088-4C3A-8FA2-1685FE810427 () v3locidad ! com
[Download RAW message or body]

CVE ID: CVE-2024-31705

Title : RCE to Shell Commands" Plugin / GLPI Shell Command Management Interface

Affected Product : GLPI - 10.X.X and last version

Description: An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute \
arbitrary code via the insufficient validation of user-supplied input.

Affected Component : A remote code execution (RCE) vulnerability has been identified in the 'Shell \
Commands' plugin of GLPI. This vulnerability affects all versions of the software, allowing a remote \
attacker to execute arbitrary code on the system.

Attack Vectors : A remote code execution (RCE) vulnerability has been identified in the 'Shell Commands' \
plugin of the GLPI (Gestionnaire Libre de Parc Informatique) system. This vulnerability is present in all \
versions of the plugin and allows remote attackers to execute arbitrary code on the system. The flaw \
stems from insufficient validation of user-supplied input within the plugin's functionality to execute \
shell commands.

Recommendation: Deactivate the Shell Commands plugin or apply strict restrictions to its access, please \
note that GLPI has already removed it from its marketplace.

Reference : https://github.com/V3locidad/GLPI_POC_Plugins_Shell

Discoverer: Julien Mula / V3locidad
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic