CVE-2023-29006

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-29006
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-29006.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-29006
Related
  • GHSA-xfx2-qx2r-3wwm
Published
2023-04-05T18:15:08Z
Modified
2025-01-08T10:02:05.559427Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Order GLPI plugin allows users to manage order management within GLPI. Starting with version 1.8.0 and prior to versions 2.7.7 and 2.10.1, an authenticated user that has access to standard interface can craft an URL that can be used to execute a system command. Versions 2.7.7 and 2.10.1 contain a patch for this issue. As a workaround, delete the ajax/dropdownContact.php file from the plugin.

References

Affected packages

Git / github.com/pluginsglpi/order

Affected ranges

Type
GIT
Repo
https://github.com/pluginsglpi/order
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.85+1.0
0.85+1.1
0.85+1.2
0.85+1.2-rc1
0.85+1.3
0.85+1.3.1

1.*

1.9.5
1.9.6
1.9.7

2.*

2.0.0
2.0.1
2.0.2
2.1.0
2.1.1
2.10.0
2.2.0
2.2.1
2.3.0
2.4.0
2.5.0
2.5.1
2.5.2
2.5.3
2.6.0
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.7.5
2.7.6
2.8.0
2.8.1
2.8.2
2.9.0