vulnerability
FreeBSD: VID-AEC9CBE0-3B0F-11EB-AF2A-080027DBE4B7 (CVE-2020-11033): glpi -- able to read any token through API user endpoint
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Mar 30, 2020 | Dec 12, 2020 | Dec 12, 2020 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Mar 30, 2020
Added
Dec 12, 2020
Modified
Dec 12, 2020
Description
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
Solution
freebsd-upgrade-package-glpi
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.