Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-AEC9CBE0-3B0F-11EB-AF2A-080027DBE4B7 (CVE-2020-11033): glpi -- able to read any token through API user endpoint

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-AEC9CBE0-3B0F-11EB-AF2A-080027DBE4B7 (CVE-2020-11033): glpi -- able to read any token through API user endpoint

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
03/30/2020
Created
12/14/2020
Added
12/12/2020
Modified
12/12/2020

Description

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

Solution(s)

  • freebsd-upgrade-package-glpi

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;