FreeBSD : glpi -- Multiple SQL Injections Stemming From isNameQuoted() (b7abdb0f-3b15-11eb-af2a-080027dbe4b7)

high Nessus Plugin ID 144122

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

MITRE Corporation reports :

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?7d9ae1c1

http://www.nessus.org/u?95e648a7

http://www.nessus.org/u?39aae35b

Plugin Details

Severity: High

ID: 144122

File Name: freebsd_pkg_b7abdb0f3b1511ebaf2a080027dbe4b7.nasl

Version: 1.3

Type: local

Published: 12/14/2020

Updated: 2/2/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2020-15176

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:glpi, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 6/25/2020

Vulnerability Publication Date: 6/25/2020

Reference Information

CVE: CVE-2020-15176