FreeBSD : glpi -- Public GLPIKEY can be used to decrypt any data (b3695b08-3b3a-11eb-af2a-080027dbe4b7)

medium Nessus Plugin ID 144148

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

MITRE Corporation reports :

GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key.
Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?808a7f0b

http://www.nessus.org/u?ef8f7517

http://www.nessus.org/u?a556ec8c

Plugin Details

Severity: Medium

ID: 144148

File Name: freebsd_pkg_b3695b083b3a11ebaf2a080027dbe4b7.nasl

Version: 1.3

Type: local

Published: 12/14/2020

Updated: 2/2/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2020-5248

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:glpi, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/2/2020

Vulnerability Publication Date: 1/2/2020

Reference Information

CVE: CVE-2020-5248