front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.
https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
https://github.com/InfotelGLPI/cmdb/security/advisories/GHSA-wv59-3rv4-vm9f
https://github.com/InfotelGLPI/cmdb/releases/tag/3.0.3
Source: Mitre, NVD
Published: 2023-04-16
Updated: 2023-04-25
Base Score: 6.8
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N
Severity: Medium
Base Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N