vulnerability
FreeBSD: VID-aec9cbe0-3b0f-11eb-af2a-080027dbe4b7 (CVE-2020-11033): glpi -- able to read any token through API user endpoint
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Mar 30, 2020 | Dec 12, 2020 | Dec 10, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Mar 30, 2020
Added
Dec 12, 2020
Modified
Dec 10, 2025
Description
MITRE Corporation reports: In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
Solution
freebsd-upgrade-package-glpi
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.