module
GLPI Inventory Plugin Unauthenticated Blind Boolean SQLi
| Disclosed |
|---|
| Mar 12, 2025 |
Disclosed
Mar 12, 2025
Description
GLPI (available to unauthenticated users), prior to using it in a dynamically constructed SQL query.
As a result, unauthenticated attackers can conduct an SQL injection attack to dump sensitive
data from the backend database such as usernames and password hashes.
In order for GLPI to be exploitable the GLPI Inventory plugin must be installed and enabled, and the
"Enable Inventory" radio button inside the administration configuration also must be checked.
As a result, unauthenticated attackers can conduct an SQL injection attack to dump sensitive
data from the backend database such as usernames and password hashes.
In order for GLPI to be exploitable the GLPI Inventory plugin must be installed and enabled, and the
"Enable Inventory" radio button inside the administration configuration also must be checked.
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.