fkie_cve-2013-5696
Vulnerability from fkie_nvd
Published
2013-09-23 03:49
Modified
2025-04-11 00:51
Severity ?
Summary
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3F2050C-A733-4E79-A59A-90B60DA26629", "versionEndIncluding": "0.84.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B215CBB3-8525-475A-B5E2-34F62511C7C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "85995AA3-1818-4CA7-BB87-539E43BCBD04", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "BCBDF788-300F-4C67-A0B9-5CFB56BF52E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C5DA370-D9BA-4EFC-B3C3-79B6170BD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "ACCCAC60-7CF1-48ED-B38D-289CABA812AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "BAFE68F5-2ED1-4566-8B8D-0CFCD71618CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "128758C3-10AF-4A4E-B994-DE0E1E35D38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "311DE5E1-25BF-430A-A059-00088B2286FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "5F4D3744-1CDC-44D9-9480-B4FD61C585C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "84D0D26A-731B-4CF6-9D92-02ABB1941186", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "59F6A082-BC41-4C22-A1DF-77304DA6238C", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "6B89364E-9D44-49F2-B9D6-7D7BA139FAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "176F87B2-9395-4EC5-9201-A3D7A4955705", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "93B2CF5E-C68F-4551-8B91-E6D69039744B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "71F0CC20-61C8-4538-9DFC-B275FDB549C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*", "matchCriteriaId": "99AAB3E6-22E0-4BA0-A4D7-9C06A8C2FCA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "B8940C0C-82F9-4209-A8D5-A70626F17E8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*", "matchCriteriaId": "A157A31C-CF17-4307-814F-304B428D8799", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*", "matchCriteriaId": "990FDC8A-6E09-4426-BBBE-B7DE56FD66E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "65F994FF-3F3B-4301-AB0C-210576F74FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*", "matchCriteriaId": "F03828AC-AA8C-4AE4-BE3C-1789B4C888B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*", "matchCriteriaId": "495826C7-2191-4120-BCAA-FB295350BD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*", "matchCriteriaId": "A78E9D3B-DEE0-495C-8375-6E1FD78C41A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4F23BF2-781D-4A1D-B979-522BCD0863C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*", "matchCriteriaId": "C69CDDCE-ECF5-490A-99E8-156258EC0927", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*", "matchCriteriaId": "6064A657-3E14-492E-9DF0-6471EF7057B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "348A5071-E1DA-4462-B328-A350704BD070", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*", "matchCriteriaId": "E460C38B-125E-49BD-A616-4979BA9F08BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*", "matchCriteriaId": "185201D0-8E00-48F7-B579-49ED8D25F7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*", "matchCriteriaId": "1CF28E43-B2A2-4ED4-8ECC-CC2E5C027448", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE47B2A4-297E-4057-BFF0-C7B75025E401", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6ECB55F-58A4-43FE-8995-3D1857DCC707", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "43503991-9AB8-4944-ABFA-E8A3FD600257", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*", "matchCriteriaId": "02F2C381-E442-4B00-8147-2C8364145505", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "64BE5EBC-333A-4792-B098-D62B74F1C262", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "F21003DB-A89B-451E-B0C3-E57017138A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "A5FD94F2-79E2-4FCD-A5A1-7A6E78938318", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*", "matchCriteriaId": "26DB5DB1-2366-48D0-B534-439EE6DB3921", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*", "matchCriteriaId": "7087437C-5B04-4AC5-9154-2377DF8060D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D441EB0-C668-481A-8AE7-B88F2ED444D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BEB7ABC-B924-45FC-AE2E-855985BA39B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*", "matchCriteriaId": "1920E885-9119-4674-989B-E454FCD78950", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "E9DC7875-2A5C-4109-911B-90A10F04F414", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*", "matchCriteriaId": "7566410B-4314-4E84-B469-20EDCCBFB77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*", "matchCriteriaId": "1C5C9152-88C4-4D05-8D88-78371ADD6192", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*", "matchCriteriaId": "024E39AB-F10D-4D42-B495-91FFADBBBBA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*", "matchCriteriaId": "A9644DAB-3046-4C22-95CB-D69570631F5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*", "matchCriteriaId": "B33C6E19-A3EE-42A6-B76F-5170F09E4EA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*", "matchCriteriaId": "F94BBB55-D0EB-4088-B579-93BC1930315F", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7FF7C06-344D-4647-B9E0-E4223D6F7F80", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "32250F48-9E4B-4F29-8D61-7762DA7F3C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*", "matchCriteriaId": "5784A35F-A07A-4570-B5AF-41F4BBBE61EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCB9B3CD-9741-4620-85E7-9E98D3D08C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*", "matchCriteriaId": "0AA1A5CA-F4D4-451A-92AE-02BBA292515B", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*", "matchCriteriaId": "C6ECFCF2-7415-4BB2-BFC6-B61E7779C055", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.78.5:*:*:*:*:*:*:*", "matchCriteriaId": "6D88E5E6-547E-4E3F-AE0C-B5CC9ECCBD11", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "12E8EC22-D5BB-42DD-8FD6-C8C89B2FF749", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2397775-5240-444E-B735-D92621FCAB43", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2007D9F-8CBD-455A-9E48-D69EB8D78C64", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.3:*:*:*:*:*:*:*", "matchCriteriaId": "C6C9D446-A34F-4CA9-9F20-11B0E61E55E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C160C2E-709E-4231-9F0F-5B9A1863AA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.5:*:*:*:*:*:*:*", "matchCriteriaId": "65BD1072-84E8-4B14-9584-35CF02669000", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.6:*:*:*:*:*:*:*", "matchCriteriaId": "0D55762E-7A45-4E57-A6D8-524D69A8CE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.7:*:*:*:*:*:*:*", "matchCriteriaId": "17774534-EB79-45E5-93FC-1E7741B87958", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.80.61:*:*:*:*:*:*:*", "matchCriteriaId": "F8F46AEE-EAC9-4771-B2AB-905CBFB67E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "E14F94C4-4ED5-44A4-A017-5EC66E3210F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B80B37D-CAF3-4109-95A9-F49E28B938C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB316B74-8FE4-40A6-A0D3-C4CD88CB9656", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D4574B9-E843-4D7A-A9E3-938051A048B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.4:*:*:*:*:*:*:*", "matchCriteriaId": "BB555723-6E7F-4D0F-92B9-BE1ACD7DBD97", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.5:*:*:*:*:*:*:*", "matchCriteriaId": "9002F098-D328-413E-9A1D-14B5759C4B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C1AC97A-6C1E-4AD4-B7E4-272224E2DBC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.7:*:*:*:*:*:*:*", "matchCriteriaId": "D54783ED-47B3-4A86-A905-3A47BF1DFFF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.8:*:*:*:*:*:*:*", "matchCriteriaId": "79559192-8658-4587-83E7-48F79EDCA429", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.9:*:*:*:*:*:*:*", "matchCriteriaId": "00067606-F029-4B5E-AF10-303D26012883", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.31:*:*:*:*:*:*:*", "matchCriteriaId": "692076F9-0855-45B1-B19E-63C9D3902511", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.83.91:*:*:*:*:*:*:*", "matchCriteriaId": "1C3BE0D5-55B3-4C08-902D-3A59EFF8BF1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:glpi-project:glpi:0.84:*:*:*:*:*:*:*", "matchCriteriaId": "FE160E31-49C5-495C-84AD-DECFFCFE3DBC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action." }, { "lang": "es", "value": "inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php despu\u00e9s de una instalaci\u00f3n completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a trav\u00e9s de una acci\u00f3n Etape_4 o (2) ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s de una acci\u00f3n update_1." } ], "id": "CVE-2013-5696", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-23T03:49:27.943", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308" }, { "source": "cve@mitre.org", "url": "https://forge.indepnet.net/issues/4480" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.glpi-project.org/spip.php?page=annonce\u0026id_breve=308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://forge.indepnet.net/issues/4480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…