module
GLPI Inventory Plugin Unauthenticated Blind Boolean SQLi
| Disclosed | Created |
|---|---|
| Mar 12, 2025 | Mar 26, 2025 |
Disclosed
Mar 12, 2025
Created
Mar 26, 2025
Description
GLPI (available to unauthenticated users), prior to using it in a dynamically constructed SQL query.
As a result, unauthenticated attackers can conduct an SQL injection attack to dump sensitive
data from the backend database such as usernames and password hashes.
In order for GLPI to be exploitable the GLPI Inventory plugin must be installed and enabled, and the
"Enable Inventory" radio button inside the administration configuration also must be checked.
As a result, unauthenticated attackers can conduct an SQL injection attack to dump sensitive
data from the backend database such as usernames and password hashes.
In order for GLPI to be exploitable the GLPI Inventory plugin must be installed and enabled, and the
"Enable Inventory" radio button inside the administration configuration also must be checked.
Authors
rz
jheysel-r7
jheysel-r7
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.