Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-832FD11B-3B11-11EB-AF2A-080027DBE4B7 (CVE-2020-11060): glpi -- Remote Code Execution (RCE) via the backup functionality

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-832FD11B-3B11-11EB-AF2A-080027DBE4B7 (CVE-2020-11060): glpi -- Remote Code Execution (RCE) via the backup functionality

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
03/30/2020
Created
12/14/2020
Added
12/12/2020
Modified
12/12/2020

Description

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

Solution(s)

  • freebsd-upgrade-package-glpi

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;